Hackers Exploit Cloud Misconfigurations to Spread Malware

Hackers Exploit Cloud Misconfigurations to Spread Malware

Veriti Analysis reveals 40% of networks enable ‘any/any’ cloud entry, exposing crucial vulnerabilities. Find out how malware like XWorm and Sliver C2 exploit cloud misconfigurations.

Latest analysis carried out by Veriti shared with Hackread.com, sheds mild on the alarming development of cybercriminals exploiting cloud infrastructure for malicious functions. The examine reveals that cloud platforms are more and more getting used not solely to host and ship malware payloads but additionally to function command-and-control centres.  

A very regarding discovering is that over 40% of networks allow unrestricted communication with at the least one main cloud supplier. This “any/any” configuration creates a major safety vulnerability, permitting attackers to simply exfiltrate information and deploy malware from seemingly trusted cloud sources. 

Veriti’s analysis highlighted particular cases of malware campaigns leveraging cloud storage. Essentially the most noteworthy cases embrace the XWorm malware’s utilization of Amazon Internet Companies (AWS) S3 storage to distribute its malicious executables. Equally, a Remcos marketing campaign employed malicious RTF recordsdata, exploiting recognized vulnerabilities, with payloads additionally hosted on AWS S3.

Past malware distribution, cloud platforms are being actively used as command-and-control (C2) servers. Varied malware households, together with Havoc, NetSupportManager, Unam Miner, Mythic, Pupy RAT, Caldera, HookBot and Brutal Ratel, have been noticed using infrastructure from main cloud suppliers like AWS, Google Cloud, Microsoft Azure, and Alibaba Cloud for C2 operations.

Cloud providers and the kind of malware being unfold via them (Screenshot credit score: Veriti)

Researchers additionally documented malware strains generally present in cloud-based assaults, comparable to Mirai and njRAT, additional emphasizing the rising abuse of cloud environments. One other regarding growth is the growing use of Sliver C2, which is being weaponized by Superior Persistent Risk (APT) teams for stealthy C2 operations and post-exploitation techniques, Veriti’s report revealed.

In your data, Sliver C2 is an open-source command-and-control framework, initially developed for penetration testing however is now being weaponized by menace actors. It’s usually used with Rust-based malware to ascertain backdoors and exploits zero-day vulnerabilities, together with latest Ivanti Connect Secure and Coverage Safe vulnerabilities.

Moreover, the examine revealed crucial vulnerabilities affecting cloud-hosted providers throughout AWS, Azure, and Alibaba Cloud. These vulnerabilities, recognized by CVE numbers, spotlight the necessity for organizations to undertake a proactive strategy to cloud safety. 

The growing abuse of cloud providers calls for a shift in direction of a security-first strategy to guard in opposition to these evolving threats, researchers famous.

“Veriti Analysis’s findings emphasize the crucial want for organizations to rethink cloud safety methods. The growing abuse of cloud providers for malware internet hosting, C2 operations, and exploitation requires a proactive, security-first strategy,” the report learn.

This could embrace proscribing “any/any” community guidelines, implementing cloud-native safety options for menace monitoring, and implementing stronger cloud safety insurance policies.

Leave a Reply