Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeMalware & ThreatsSANS Institute Alerts to New Cloud-Native Ransomware Threats

SANS Institute Alerts to New Cloud-Native Ransomware Threats

Published on

spot_img

In a recent report by Palo Alto Networks Unit 42, it was revealed that sensitive data is present in as much as 66% of cloud storage buckets, leaving it vulnerable to ransomware attacks. The SANS Institute has highlighted that these attacks can exploit the cloud provider’s storage security controls and default settings, potentially leading to devastating consequences.

Security consultant and SANS Certified Instructor, Brandon Evans, raised alarm over the increasing sophistication of ransomware attacks, emphasizing that threat actors are now leveraging legitimate cloud security features to execute their malicious activities. One such attack campaign, disclosed by Halcyon, utilized Amazon S3’s native encryption mechanism, SSE-C, to encrypt target buckets. Additionally, security consultant Chris Farris demonstrated how attackers could exploit AWS security feature, KMS keys with external key material, using ChatGPT-powered scripts. This trend underscores the importance of addressing cloud ransomware with effective strategies.

To combat cloud ransomware effectively, SANS recommends that organizations take proactive measures:

  1. Understand the power and limitations of cloud security controls:
    It is crucial for security professionals to grasp the functionalities and constraints of cloud security controls. Merely utilizing cloud services does not guarantee the safety of data, as evidenced by the lack of file recovery capabilities in services like Amazon S3, Azure Storage, and Google Cloud Storage. Awareness and comprehension of how these services operate are essential to bolster security.

  2. Block unsupported cloud encryption methods:
    Organizations should implement Identity and Access Management (IAM) policies to restrict the use of vulnerable encryption techniques like AWS S3 SSE-C and AWS KMS external key material. Mandating the use of secure encryption methods, such as SSE-KMS using key material hosted in AWS, can mitigate the risks associated with ransomware attacks.

  3. Enable backups, object versioning, and object locking:
    Integrity and availability controls like backups, object versioning, and object locking play a crucial role in data recovery post-ransomware attack. While these features are not enabled by default in major cloud providers, activating them can increase the likelihood of data restoration in the event of an attack.

  4. Balance security and cost with data lifecycle policies:
    Organizations must strike a balance between data security and financial considerations when defining data lifecycle policies. Cloud providers offer tools to automate the deletion of unnecessary data objects, versions, and backups, helping organizations manage costs while enhancing security. However, it is vital to anticipate potential misuse of these policies by threat actors and implement appropriate safeguards.

In conclusion, the evolving landscape of ransomware threats in the cloud underscores the critical importance of proactive security measures. By understanding cloud security controls, blocking unsupported encryption methods, enabling essential data protection features, and implementing robust data lifecycle policies, organizations can enhance their resilience against ransomware attacks. To delve deeper into mitigating risks in cloud environments, Brandon’s webcast and course offerings provide valuable insights and strategies to bolster cloud security posture and defend against emerging threats.

Source link

Latest articles

GitHub Data Breach Exposes Thousands of Software Supply Chain Secrets

GitHub Actions, a popular CI/CD service utilized by developers to automate software builds and...

Participation Needed for Wellbeing in the Cybersecurity Sector

In the realm of cybersecurity, a pressing issue looms large - the wellbeing of...

Knostic secures $11 million to prevent data leaks in Enterprise AI

Knostic, a cybersecurity startup, has secured $11 million in funding to further develop its...

Infostealers fueled cyberattacks and stole 2.1B credentials last year

Last year, cybercriminals unleashed a wave of havoc using information-stealing malware, resulting in the...

More like this

GitHub Data Breach Exposes Thousands of Software Supply Chain Secrets

GitHub Actions, a popular CI/CD service utilized by developers to automate software builds and...

Participation Needed for Wellbeing in the Cybersecurity Sector

In the realm of cybersecurity, a pressing issue looms large - the wellbeing of...

Knostic secures $11 million to prevent data leaks in Enterprise AI

Knostic, a cybersecurity startup, has secured $11 million in funding to further develop its...