Ten years ago, cryptocurrencies were an academic concept, largely unknown to the global population. Now, they are considered to be the ‘digital gold’ of our era.

It all began with the appearance of Bitcoin in 2009, which led to the creation of over 4,000 cryptocurrencies in the following decade. While cryptocurrencies have significantly changed the world of finance world, they have attracted many cybercriminals to the industry. Recent statistics indicate that cryptojacking incidents have surged dramatically. In the first half of 2023, there were over 332 million cryptojacking attempts worldwide, marking a 399% increase compared to the same period in 2022.

Let’s now look at how our client, a logistics operator in Europe, managed to proactively detect and remediate a crypto jacking incident with the help of our Cloud Security team.

Key Challenges

Recently, a crypto mining malware infected an AWS machine of one of our clients. This incident was eating up resources and started to add up to the cloud bill.

We became aware of the issue through Guarduty, an AWS tool which identified the number of the machine and the account that got infected. Before we intervened, the problem had gone unnoticed since nobody had been assigned to the monitoring of this tool.

Our Approach

We started off by applying quick countermeasures, namely immediately blocking all public accesses. That way, we ensured that all the open doors to the crypto-jacked account were closed, automatically removing any actor attempting to perform malicious activities.

After the first wave of panic, we met with the client teams and identified the source of the incident which turned out to be a Kubernetes cluster. We then came up with as many recommendations as possible, coming various sources (development teams, tools, external agencies, etc.) to make sure that a similar incident would not happen again.

From that time until now our teams have been hard at work to enhance the security of the above-mentioned Kubernetes clusters. To do so, we implemented Kubescape, a monitoring tool that identifies all open vulnerabilities and ports that can cause a compromise.

In a second step, we set up a security remediation channel where we applied at a fast pace remediations based on the recommendations from 4 different tools (3 from Amazon, 1 CBTW-owned tool).

Thirdly, we structured and applied security governance. Indeed, while the organization had the appropriate tools and human resources, they lacked the delegation processes and stakeholders to receive and monitor the alerts. That’s where our Managed Services offering came in handy.

Benefits

We have applied inbound and outbound rules to stop all external traffic and set up alarms in the even where anyone would try to spin up an external public machine. By setting those triggers, we will be able to easily prevent potential crypto jacking incidents from happening in the future.

Because (or thanks) of this crypto jacking, we have safeguarded our clients’ cyber space on a much larger scope than the one on which the initial problem was located.

While we were initially only involved in the Advise and Build phases of our client’s Cloud initiative, we are now able to have a bird’s eye view on their cloud initiative by handling the Run and Optimize stages as well.

We will move into a Cloud Managed Services engagement model with the client, where the management of the Cloud will be based further on the shared responsibility model of the Cloud Platform. While enforcing certain security policies for compliance and following best-practices, development teams can still have the needed liberties to be able to test, build, deploy and run their applications. As a Cloud Integrator we will help our client to keep an eye on the overall security posture and risks and advice our client to avoid such incidents from happening again, or at least build save segmentation between the different layers of the client’s application and network topology.

Share
Insights

Access related expert insights

Expert Articles
Expert Articles
17 Apr 2026
SEO meta title: The hidden cost of routine customer queries in retail What “routine” really means in retail customer service In retail, “routine” doesn’t mean “easy.” It means repeatable. WISMO (Where Is My Order), returns, delivery changes, missing items: these are predictable intents. But they often involve multiple systems, policy rules, and exceptions. That’s why […]
The Hidden Cost Of Routine Customer Queries In Retail
The Hidden Cost Of Routine Customer Queries In Retail
Expert Articles
Expert Articles
14 Apr 2026
The race to adopt artificial intelligence has moved faster than almost any technological shift in history. According to McKinsey’s 2025 State of AI report, 88% of organizations have now integrated AI into at least one business function – a significant jump from just 78% a year prior. While generative AI adoption has more than doubled […]
AI Governance in APAC: The Executive’s Blueprint for Digital Trust
AI Governance in APAC: The Executive’s Blueprint for Digital Trust
Case Studies
Case Studies
10 Apr 2026
CBTW helped Finacca modernize its investigation platform by replacing a legacy ERP hosted in its Paris offices with a scalable Mendix low-code solution. Starting with an MVP dedicated to dormant life-insurance investigations, the team accelerated development, improved investigator workflows, and built the foundation for a broader digital platform. The result: faster case management, secure cloud access, and an architecture ready to support new applications and future AI-driven capabilities.
How Finacca Modernized its Life-Insurance Investigation Platform
How Finacca Modernized its Life-Insurance Investigation Platform