Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeCII/OTMerging with the Cloud: Krebs on Security

Merging with the Cloud: Krebs on Security

Published on

spot_img

In a significant effort to camouflage their malicious activities and evade detection, hosting firms in China and Russia are increasingly routing their operations through major U.S. cloud providers. This trend has been highlighted by recent research on a Chinese content delivery network named “Funnull,” which is linked to Chinese organized crime groups and engages in a variety of illicit activities such as hosting fake trading apps, pig butchering scams, gambling websites, and retail phishing pages through major cloud platforms like Amazon AWS and Microsoft Azure.

The issue of “Funnull” came to light when the security firm Silent Push published an analysis in October 2024, detailing how this Chinese network was utilizing services from Amazon and Microsoft to carry out its operations. Notably, Funnull gained attention after acquiring the domain name “polyfill[.]io” and conducting a supply-chain attack on legitimate domains linked to this popular open-source code library. The network was found to host gambling sites associated with the Suncity Group, a Chinese entity known for laundering funds for criminal organizations.

Suncity’s CEO had previously been sentenced to 18 years in prison for various offenses, including illegal gambling and collaborating with organized crime syndicates. The use of gambling sites by Funnull is suspected to be part of money laundering schemes, exploiting top casino brands to disguise illicit activities. The presence of these sites may also be aiding Chinese online gamblers in bypassing the country’s strict regulations on gambling.

Silent Push’s Zach Edwards highlighted the concept of “infrastructure laundering,” where cybercriminals route their malicious traffic through reputable U.S. cloud providers to evade detection. This practice poses challenges for security experts as blocking entire cloud providers is not feasible due to the sheer volume of legitimate domains hosted on these platforms.

Major cloud providers like Amazon and Microsoft, when alerted to abusive activities, take swift action to suspend accounts linked to such operations. However, the perpetrators often employ tactics like using compromised accounts or stolen data to continue their illicit activities, making it difficult to eradicate the problem completely.

The issue of malicious traffic being funneled through U.S. cloud providers is not new, with previous instances like the Stark Industries Solutions network being used as a proxy for cyberattacks and disinformation campaigns. Groups like NoName057(16) have leveraged cloud providers to launch DDoS attacks against targets perceived as adversarial to their interests.

Efforts are being made by regulatory bodies like the U.S. Department of Commerce to impose stricter regulations on cloud providers to curb illicit activities. Proposed rules would require providers to implement customer identification programs to verify the legitimacy of their clients, especially in cases involving foreign entities with suspicious transactions.

The evolving landscape of cybercrime and the growing use of reputable cloud providers for illicit activities present a complex challenge for law enforcement and security agencies. As cybercriminals adapt their tactics to advance through the cloud infrastructure, collaborative efforts between governments, regulatory bodies, and technology companies are essential to combat this ongoing threat effectively.

Source link

Latest articles

The True Cost of Cybercrime: Global Damages Could Reach $1.2 – $1.5 Trillion by End of Year 2025

Cybercrime has transcended from being just an IT issue to a global economic crisis...

Top 5 threats keeping CISOs awake at night in 2025

In 2025, the landscape of cyber threats has evolved, requiring CISOs to take a...

New Cyber Attack Targets PyPI Users for Stealing Cloud Tokens and Sensitive Data

A recent discovery made by researchers at ReversingLabs has brought to light a malicious...

Breaking: Aptori’s AI-powered platform lowers risk, ensures compliance — now available on Google Marketplace

Aptori, a pioneer in AI-driven application security, has recently unveiled its AI-driven AppSec Platform...

More like this

The True Cost of Cybercrime: Global Damages Could Reach $1.2 – $1.5 Trillion by End of Year 2025

Cybercrime has transcended from being just an IT issue to a global economic crisis...

Top 5 threats keeping CISOs awake at night in 2025

In 2025, the landscape of cyber threats has evolved, requiring CISOs to take a...

New Cyber Attack Targets PyPI Users for Stealing Cloud Tokens and Sensitive Data

A recent discovery made by researchers at ReversingLabs has brought to light a malicious...