HomeCII/OTCybercriminals take advantage of inadequately set-up cloud environments

Cybercriminals take advantage of inadequately set-up cloud environments

Published on

spot_img

Offensive security tools and misconfigured cloud environments continue to pose significant risks to organizations, creating openings in the attack surface for threat actors to exploit. According to Elastic, adversaries are increasingly utilizing off-the-shelf tools such as Cobalt Strike and Metasploit, which made up approximately 54% of observed malware alerts. Cobalt Strike, in particular, accounted for 27.02% of infections and is known for its effectiveness in post-exploitation activities.

Malware families like Gafgyt, Mirai, and Bedevil, which are commonly distributed to IoT devices for launching DDoS attacks, showed a decrease in prevalence compared to previous years. This shift may indicate efforts to neutralize botnets and prevent their propagation. However, the use of brute force techniques in cloud environments, especially in Microsoft Azure, saw a 12% increase, highlighting the need for stronger security measures to protect against credential access and endpoint behaviors.

The misconfiguration of cloud environments remains a significant challenge for organizations, with storage account misconfigurations accounting for 47% of Microsoft Azure failures. In Google Cloud, 44% of users failed checks related to BigQuery due to a lack of customer-managed encryption, while AWS failures were attributed to the absence of MFA implementation in S3 checks. These vulnerabilities in cloud security underscore the importance of well-tuned security capabilities and policies to defend against cyber threats.

Looking ahead, the malware-as-a-service model is expected to become more popular as cybercriminals seek to abstract themselves from intrusions and government scrutiny. This shift may lower the barrier to entry for less experienced threat groups, but it also complicates attribution and crime-busting efforts. GenAI technologies, which are increasingly used in business operations, present both opportunities and risks in terms of data exposure and system exploitation. Adversaries are likely exploring ways to exploit vulnerabilities in AI models to extract sensitive information or disrupt operations.

Despite the evolving threat landscape, security efforts are making a difference in deterring adversaries and mitigating risks. However, mature threat actors are finding ways to overcome obstacles by exploiting inherent vulnerabilities in systems and processes. Enterprises are urged to enhance their security measures by securing public-facing systems, implementing MFA, reducing their attack surface, and safeguarding critical data to effectively detect and respond to threats. By staying proactive and vigilant, organizations can better defend against emerging cyber threats and protect their digital assets.

Source link

Latest articles

Ransomware Negotiator Enters Guilty Plea – CyberMaterial

Ex-Ransomware Negotiator Pleads Guilty to Conspiracy with BlackCat Group Angelo Martino, a former ransomware negotiator,...

New Threats Against AI Assistants

New Cyberattack Method Targets AI Assistants Like GitHub Copilot Cybersecurity researchers from Forcepoint have recently...

Trigona Ransomware Employs Unique Exfiltration Tool

Trigona Ransomware Group Shifts Tactics with Custom Data Exfiltration Tool In March 2026, the Trigona...

Rituals Reveals Data Breach – CyberMaterial

Data Breach at Rituals: Customer Information Compromised Luxury cosmetics brand Rituals has recently confirmed a...

More like this

Ransomware Negotiator Enters Guilty Plea – CyberMaterial

Ex-Ransomware Negotiator Pleads Guilty to Conspiracy with BlackCat Group Angelo Martino, a former ransomware negotiator,...

New Threats Against AI Assistants

New Cyberattack Method Targets AI Assistants Like GitHub Copilot Cybersecurity researchers from Forcepoint have recently...

Trigona Ransomware Employs Unique Exfiltration Tool

Trigona Ransomware Group Shifts Tactics with Custom Data Exfiltration Tool In March 2026, the Trigona...