Threat actors wielding stolen AWS Identity and Access Management (IAM) credentials leverage Amazon EC and EC2 infrastructure across multiple customers.
https://www.darkreading.com/cloud-security/attackers-use-stolen-aws-credentials-cryptomining
Virtual Machine News Platform
https://www.darkreading.com/cloud-security/attackers-use-stolen-aws-credentials-cryptomining