Data stolen using public cloud infrastructure

Dirk Schrader, Global VP of Security at Netwrix has provided the following comment outlining how this malware works, who is in danger, detection tips as well as preventative measures.

“An ongoing malware campaign recently documented by Cisco’s Talos Group, abuses the public cloud infrastructures of the likes of Amazon’s AWS and Microsoft’s Azure cloud services. This ‘activity’ means that threat actors are moving towards a fully dynamic attack infrastructure with the intention to circumvent initial distribution and access detection in ways unseen so far. Cybersecurity professionals are calling for Microsoft and Amazon to step up protections from misused public cloud instances in their possession. This could only slow down the attackers as they will turn to hijacked infrastructure. Attackers distributing malware using phishing emails with malicious attachments is nothing new. Once the attachment in the phishing email is opened, the second stage of a malware campaign is to ‘get in’.

“While previous campaigns have been successfully thwarted at this stage, this one comes with a couple of new tricks. First of all, usage of a public cloud instances makes it difficult to dissect the malicious traffic from legitimate IP traffic to those cloud providers and solution providers using them. Moreover, this time the attackers also run a dynamic domain name scheme that is designed to render DNS based filters useless.

“Almost every organisation is at risk of being targeted by this kind of campaign, even if the one analysed by Talos seems to focus on North America, Singapore and Italy. It might be just a question of the wording and language used in the phishing emails being more successful in the affected regions. As the usual prevention methods are diminished with this campaign, organisations need to improve their abilities to detect the activity of attacker that happen in the third stage of a malware attack: ‘get ready’.

“Talos’ analysis describes in detail the methods used to connect to the cloud instances and download additional resources from them. That resource, known as remote access trojan, RATs, namely NanoCore, NetWire or AsyncRAT is downloaded using Powershell commands, which marks the first detection point to keep an eye on. Any use of Powershell by a regular user should be monitored, if not disabled by group policy security settings. If such activity is detected, an organisation can execute on pre-defined remediation steps like roll backs or it can quarantine the affected system to prevent further spread. Should that not be in place, the following downloads and change in registry setting related to those RAT malware strains can be detected using a file integrity monitoring solution.

“This campaign also shows an initial confirmation of one of our team’s highlighted cyber security trends for 2022 that attackers will use hijacked infrastructure like unmanaged devices in home networks, being much easier to infect with malicious software than a professionally secured enterprise IT environment. With processing power and bandwidth connectivity in residences increasing, home networks will become more attractive to bad actors. For example, by infecting many devices, they will be able to change IP addresses or even domain names dynamically during malware campaigns, thwarting common defences like IP blocking and DNS filtering. IT teams should keep this new threat vector in mind when reviewing their security strategies and incident response plans as described above. Moreover, the IT industry should seek to increase user awareness and best practices adoption to reduce the number of ‘easy victims’.”

 

Media contact

Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Radware unveils new cloud security centre

Radware, a provider of cyber security and application delivery solutions, announced the launch of a new cloud security centre in the United Arab Emirates.
Ministry of Defence

New £50m UK defence centre to open

A new £50 million UK centre will support the training of world-class cyber experts, both domestically and internationally.

Barracuda to demonstrate innovations at GITEX 2022

Having unveiled a series of updates across its security portfolio, Barracuda, a provider of cloud-first security solutions, is now heading to GITEX 2022.
Neustar Security Services

Neustar Security Services expands partner network

Neustar Security Services has expanded its partner ecosystem across key technology hubs in the Europe, Middle East and Africa region.

Lookout Appoints Deborah Wolf as Chief Marketing Officer

Lookout, Inc., a provider of cloud security solutions, today announced the appointment of marketing executive Deborah Wolf as its new CMO.

Gallagher Gears Up For GSX

Gallagher is geared up to attend the Global Security Exchange (GSX), taking place at Georgia World Congress Centre in Atlanta from 12-14 September 2022.

Aqua Trivy receives CPSM addition

Aqua Security today announced the addition of cloud security posture management (CPSM) capabilities to the open source tool Aqua Trivy.

Aqua Trivy receives CPSM addition

Aqua Security today announced the addition of cloud security posture management (CPSM) capabilities to the open source tool Aqua Trivy.

Greater intelligence, safer ports

How can artificial intelligence and machine learning improve maritime and port security both on land and sea?  
Scroll to Top