Session

Hunting Cryptojackers in the Multicloud: AWS, Azure, and GCP

In this live incident response simulation, the audience will be randomly divided into three teams, each representing a cloud environment: AWS, Azure, or GCP. Each team receives a curated breach scenario reconstructed from anonymized real-world cryptomining activity. Datasets include IAM traces, billing anomalies, container workload artifacts, and intentionally misleading signals to simulate realistic investigation challenges.

The objective: be the first team to correctly identify the cloud resource — an EC2 instance, GKE pod, or AKS container group — responsible for unauthorized cryptocurrency mining.
No vendor tooling, no product demo — just a hands-on exercise focused on attacker behavior in cloud-native environments

This session is a practical, time-limited investigation focused on identifying differences in visibility, telemetry, and detection across AWS, Azure, and GCP. Each team works with real-world logs, connects observed behaviors, and supports their findings with evidence.

Adelia Ibragimova

Detection & Response | Cloud IR | AWS / GCP / Azure

Fairfax, Virginia, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top