HomeCII/OTCybercriminals take advantage of inadequately set-up cloud environments

Cybercriminals take advantage of inadequately set-up cloud environments

Published on

spot_img

Offensive security tools and misconfigured cloud environments continue to pose significant risks to organizations, creating openings in the attack surface for threat actors to exploit. According to Elastic, adversaries are increasingly utilizing off-the-shelf tools such as Cobalt Strike and Metasploit, which made up approximately 54% of observed malware alerts. Cobalt Strike, in particular, accounted for 27.02% of infections and is known for its effectiveness in post-exploitation activities.

Malware families like Gafgyt, Mirai, and Bedevil, which are commonly distributed to IoT devices for launching DDoS attacks, showed a decrease in prevalence compared to previous years. This shift may indicate efforts to neutralize botnets and prevent their propagation. However, the use of brute force techniques in cloud environments, especially in Microsoft Azure, saw a 12% increase, highlighting the need for stronger security measures to protect against credential access and endpoint behaviors.

The misconfiguration of cloud environments remains a significant challenge for organizations, with storage account misconfigurations accounting for 47% of Microsoft Azure failures. In Google Cloud, 44% of users failed checks related to BigQuery due to a lack of customer-managed encryption, while AWS failures were attributed to the absence of MFA implementation in S3 checks. These vulnerabilities in cloud security underscore the importance of well-tuned security capabilities and policies to defend against cyber threats.

Looking ahead, the malware-as-a-service model is expected to become more popular as cybercriminals seek to abstract themselves from intrusions and government scrutiny. This shift may lower the barrier to entry for less experienced threat groups, but it also complicates attribution and crime-busting efforts. GenAI technologies, which are increasingly used in business operations, present both opportunities and risks in terms of data exposure and system exploitation. Adversaries are likely exploring ways to exploit vulnerabilities in AI models to extract sensitive information or disrupt operations.

Despite the evolving threat landscape, security efforts are making a difference in deterring adversaries and mitigating risks. However, mature threat actors are finding ways to overcome obstacles by exploiting inherent vulnerabilities in systems and processes. Enterprises are urged to enhance their security measures by securing public-facing systems, implementing MFA, reducing their attack surface, and safeguarding critical data to effectively detect and respond to threats. By staying proactive and vigilant, organizations can better defend against emerging cyber threats and protect their digital assets.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...