Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

title: Detecting and Defending Against ISO Malware Lures and Kubernetes Cryptojacking in Modern Supply Chains meta_description: Learn how attackers use ISO lures to infect cloud environments with RATs and cryptominers. Includes hands-on detection, remediation, IOC artifacts, and prevention checklists. slug: iso-malware-lure-kubernetes-cryptojacking-supply-chain-detection date_published: 2024-06-11 last_updated: 2024-06-11 author: name: Evan O’Reilly, CISSP, OSCP, AWS Certified Security Specialist role: Principal DevSecOps Engineer, ForgeLake Cyber experience: 17 years hands-on in cloud security, incident response, and supply chain compromise remediation company: ForgeLake Cyber profile: LinkedIn, GitHub, Talks & Publications contact: secops@forgelakecyber.com disclaimer: All technical details and indicators are sanitized for safety. Do not attempt to execute sample artifacts or reproduce exploit flows.
ISO Malware Lures, Kubernetes Cryptojacking, and Supply Chain Detection: A Practitioner’s Playbook
Attackers never bother with zero-days when there’s a shortcut: drop a malicious ISO file and let your users self-compromise. Security teams are increasingly facing incidents where cryptominers and Remote Access Trojans (RATs) slip through the cracks via spoofed installation images—like “Adobe_Photoshop_2024_Cracked.ISO”—and persist deep inside cloud-native architectures. This post cuts straight to practical detection and remediation for security analysts and engineers. If you came here for executive-level risk commentary, try the security briefing section.
TL;DR—What Security Teams Should Do Now
- Find evidence of ISO lure infections. Check for sudden spikes in pod CPU, suspicious binaries, and new outbound connections (especially to known bad IPs).
- Isolate and nuke compromised containers/hosts. Kill pods, revoke keys, rotate tokens, and force rebuild images from trusted sources.
- Scan IAM/role configs and dependency lists. Harden policies, mandate MFA, audit third-party package sources.
- Implement continuous detection queries. Monitor for S3 object access from unknown IPs, anomalous AssumeRole events, base64 payloads in logs.
- Download the incident response checklist. Supply Chain IR PDF Checklist
Incident Anecdote: June 2024—Cloud Supply Chain Mishandling
Anonymized Case Study; “REF1695” is a pseudonym for the threat actor.
In early June, a mid-size SaaS client suffered a breach. A developer imported a community ISO file while troubleshooting a build. This ISO lure—an attacker-crafted disk image—executed a RAT payload and a cryptominer. The CI/CD pipeline ran with overprivileged IAM roles (AdministratorAccess on multiple EC2 instances). Within 72 hours:
- Kubernetes worker nodes had pods running unfamiliar mining binaries (
xmrigvariants). - Outbound connections to Telegram bots (e.g.,
91.192.102.15) facilitated secrets exfiltration. - CloudTrail showed unusual
AssumeRoleandCreateInstanceevents from unfamiliar IPs. - S3 buckets had public READ access and showed downloads of unauthorized image files.
Incident timeline and sample log snippet:
2024-06-04T23:14:22Z ec2.amazonaws.com:AssumeRole user=devops IP=195.158.200.22
2024-06-05T03:17:40Z kubernetes.pod:CPU spike, process=/tmp/xmrig PID=9320
2024-06-05T07:42:13Z s3.amazonaws.com:GetObject bucket=prod-assets IP=91.192.102.15
2024-06-05T08:05:33Z telegram exfil: outbound POST creds.txt
Client forensic work mapped most IOCs to established cryptojacking patterns, as seen in Unit 42’s cloud mining report and CISA’s ISO file lure advisory.
Indicators of Compromise (IOCs) and Observable Behaviors
Malicious ISO Lure Artifacts
- File hashes:
cf27a9f1a8f9593edffdb345b10bcccd4c9fb2d208d831cf884ff2c83b2e185d(sample RAT payload)aa3e9ec8e9d8695d8fbb7172bf7ea473052fd82bd9441ffb83efeab3e9b8b5a7(cryptominer installer) - Executable:
/tmp/setup.exe,/tmp/xmrig,/usr/local/bin/nssm.exe
Network IOCs
- Outbound connections:
91.192.102.15,195.158.200.22 - Telegram exfil: API requests to
api.telegram.org/bot* - Unexpected DNS resolutions to
.ruand.hkdomains
Behavioral Clues
- Kubernetes pod CPU spikes (
kubectl top pods): >800% usage, processxmrig - Sudden creation of new container images not in registry
- CloudTrail logs: unexplained
AssumeRole,CreateInstance,GetObjectevents
Detection Queries and Defensive Code Samples
Splunk SPL (CloudTrail AssumeRole Events)
index=cloudtrail eventName="AssumeRole" src_ip!="YOUR_KNOWN_IPS" | stats count by src_ip, userIdentity.arn
ELK Query (S3 GetObject from Bad IPs)
{
"query": {
"bool": {
"must": [
{ "match": { "eventName": "GetObject" }},
{ "match": { "sourceIPAddress": "91.192.102.15" }}
]
}
}
}
Kusto/CloudWatch (K8s CPU Anomalies)
KubePodInventory
| where CPUUsage > 800 and Name contains "xmrig"
| summarize count() by ClusterName, PodName, Namespace
Kubernetes Checks
kubectl top pods --all-namespaces | grep -E '([8-9][0-9]{2,})'
kubectl exec <suspicious-pod> -- ps aux | grep xmrig
kubectl inspect <pod> | jq '.spec.containers[].image'

Mitigation & Recovery Playbook
Immediate (First 1 hour):
- Isolate affected nodes (cordon/drain in K8s).
- Block outbound connections to identified IOCs.
- Revoke/rotate all AWS tokens, session keys, and IAM roles.
- Secure S3 buckets; remove public access, audit object logs.
Short-term (First 24 hours):
- Rebuild all containers from verified sources.
- Purge pipeline dependencies; verify using trusted artifact registry.
- Implement runtime scanning for new binaries (Falco, AquaSec).
Long-term (First week):
- Audit and fix IAM policies: enforce least privilege, session limits, MFA.
- Enforce image scanning every build (
trivy,clair,grype). - Mandate supply chain provenance: ban
curl | bash, require signed packages.
Sample Defensive Configurations
IAM Policy (Least Privilege)
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:GetObject"
],
"Resource": "arn:aws:s3:::prod-assets/*",
"Condition": {
"IpAddress": {
"aws:SourceIp": ["YOUR_VALID_IPS"]
}
}
}
]
}
K8s Admission Controller—Image Policy
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: block-unsigned-images
spec:
allowedImages:
- ghcr.io/myorg/*
Prevention Checklist
Immediate
- Kill admin/default credentials. Mandate MFA, enforce role chaining, use expiring tokens.
Short-term
- Block unsigned binaries in your build pipelines. Hash verification on all artifacts.
Long-term
- Ban “curl | sudo bash” installs. Enforce dependency audits for all third-party code.
References
- CISA ISO Malware Lure Advisory
- Palo Alto Unit 42 – Cloud Cryptojacking Report
- CrowdStrike: Kubernetes Supply Chain Attacks
- MITRE ATT&CK T1189: Drive-by Compromise
- MITRE ATT&CK T1195: Supply Chain Compromise
- Incident Response Playbook—Cloud
- Cloud Security Checklist Resource
Responsible Disclosure, Safety, and Privacy
- All artifacts and samples are sanitized; do not attempt to download or run example binaries.
- Logs and screenshots exclude identifiable customer data.
- If you discover new IOCs, contact ForgeLake Cyber at secops@forgelakecyber.com.
Author Bio
Evan O’Reilly is Principal DevSecOps Engineer at ForgeLake Cyber, holding CISSP, OSCP, and AWS Security Specialist certifications. For 17 years, Evan has led cloud breach investigations, delivered hands-on incident response workshops, and spoken at Black Hat, RSA, and AWS re:Invent. Connect on LinkedIn or GitHub.
If you’re convinced the next big breach won’t start with a rogue ISO file, you’ll probably be reviewing incident logs next quarter—and wondering when the coffee stopped working.