HomeCyber BalkansWorking from Tehran while being registered in Wyoming

Working from Tehran while being registered in Wyoming

Published on

spot_img

Halcyon researchers have recently released a report shedding light on the command-and-control providers that ransomware gangs rely on. Their investigation points to Cloudzy, a virtual private server (VPS) provider, as a common service used to support ransomware attacks and other cybercriminal activities. Although Cloudzy is incorporated in the United States, specifically in the state of Wyoming, the researchers suspect that the company operates from Tehran, Iran, potentially violating U.S. sanctions.

The report emphasizes the broad range of threat actors that leverage Cloudzy’s services. According to Halcyon, these actors include advanced persistent threat (APT) groups associated with various governments, such as China, Iran, North Korea, Russia, India, Pakistan, and Vietnam. In addition, the report highlights the involvement of criminal syndicates, ransomware affiliates, and even a sanctioned Israeli spyware vendor known for targeting civilians. The researchers stress that the campaigns orchestrated by these actors have attracted global attention.

What differentiates Cloudzy from bulletproof hosting providers is its lack of commitment to privacy. Bulletproof hosting providers, for the most part, claim to prioritize privacy. In contrast, Cloudzy attempts to hide its connections while pretending to be a legitimate company. Furthermore, Cloudzy appears to dismiss complaints of abuse, a behavior that is highly unlikely for a lawful entity.

There is a striking similarity between the activities carried out by criminal organizations and state-sponsored groups. These actors often employ comparable tools, tactics, and techniques. Rosa Smothers, a former CIA Cyber Threat Analyst and the current SVP of Cyber Operations at KnowBe4, likened the situation to the SolarWinds attack on U.S. federal and private sector infrastructure. Smothers noted that the attack, commonly referred to as “Sunburst,” was attributed to Russia and involved the use of Amazon Web Services (AWS) as a command-and-control provider (C2P). In both instances, it is unrealistic to expect the provider to monitor the activities of threat actors due to privacy agreements with customers and the use of encryption.

The modern hosting provider for the dark web, as described by Tom Kellermann, SVP of Cyber Strategy at Contrast Security, resembles Cloudzy. Kellermann acknowledges that the dark web is home to various actors, not all of whom are classified as pure cybercriminals. He emphasizes that the dark web operates at a scale comparable to that of Silicon Valley, with cybercrime cartels managing the infrastructure that enables its existence. Kellermann expresses hope that the FBI will disrupt and dismantle Cloudzy, describing it as a nefarious hosting provider.

The findings of Halcyon’s report shed light on the significant role command-and-control providers play in supporting ransomware attacks and other illicit online activities. Given the range of actors leveraging Cloudzy’s services, it is imperative for law enforcement agencies to take action to mitigate these threats to cybersecurity.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...