• krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • Attackers use public cloud providers to spread RATs
    Home SecurityCloud Security Attackers use public cloud providers to spread RATs

    Attackers use public cloud providers to spread RATs

    A campaign that uses public cloud service providers to spread malware has been discovered by Cisco Talos. The offensive is the latest example of threat actors abusing cloud services like Microsoft Azure and Amazon Web Services for malicious purposes, security researchers Chetan Raghuprasad and Vanja Svajcer wrote in the Talos blog.

    To camouflage their activity, the researchers noted, the hackers used the DuckDNS dynamic DNS service to change the domain names of the command-and-control hosts used for the campaign, which started distributing variants of Nanocore, Netwire, and AsyncRATs to targets in the United States, Italy and Singapore, starting around October 26. Those variants are packed with multiple features to take control of a target’s computer, allowing it to issue commands and steal information.

    Attack begins with phishing email containing poisoned ZIP file

    The researchers found that the initial infection vector for the attackers is a phishing email with a poisoned ZIP archive. The archive contains an ISO image with a malicious script. When the script executes, it connects to a server, which is typically hosted on Azure or AWS, to download the next stage of the malware.

    “Threat actors are increasingly using cloud technologies to achieve their objectives without having to resort to hosting their own infrastructure,” the researchers wrote. “These types of cloud services like Azure and AWS allow attackers to set up their infrastructure and connect to the internet with minimal time or monetary commitments. It also makes it more difficult for defenders to track down the attackers’ operations.”

    Attack not new, but underscores risk of public cloud

    Using someone else’s infrastructure for command-and-control of malware isn’t a new practice, observes Oliver Tavakoli, CTO of Vectra, a provider of automated threat management solutions. “In the pre-cloud days, this approach involved breaking into someone’s compute infrastructure and hosting malware distribution and C2 communication from there,” he says. “In the age of public clouds, you can just rent the compute in a pool that has a murky reputation and cannot easily be blacklisted.”

    “Threat actors use well-known cloud services in their campaigns because the public passively trusts big companies to be secure,” adds Davis McCarthy,

    Copyright © 2022 IDG Communications, Inc.

    Source link

    Related Articles

    Leave a Comment

    techhipbettruvabetnorabahisbahis forumutaraftarium24eduseduedusedueduseduseduseduseduedu