Upgrade & Secure Your Future with DevOps, SRE, DevSecOps, MLOps!

We spend hours on Instagram and YouTube and waste money on coffee and fast food, but won’t spend 30 minutes a day learning skills to boost our careers.
Master in DevOps, SRE, DevSecOps & MLOps!

Learn from Guru Rajesh Kumar and double your salary in just one year.

Get Started Now!

Cybercriminals Use Cloud Technology To Accelerate Business Attacks

Source: aithority.com

Trend Micro Incorporated, the leader in cloud security, has identified a new class of cybercrime. Criminals are using cloud services and technology to speed up attacks, which decreases the amount of time enterprises have to identify and respond to a breach.

Trend Micro Research found terabytes of internal business data and logins for popular providers like Amazon, Google, Twitter, Facebook, and PayPal offered for sale on the dark web. This data is sold via access to the cloud logs in which it is stored. This results in more stolen accounts being monetized, and the time from initial data theft to stolen information being used against an enterprise has decreased from weeks to days or hours.

“The new market for access to cloud logs ensures stolen information can be used more quickly and effectively by the cybercrime community—that’s bad news for enterprise security teams,” said Robert McArdle, director of forward-looking threat research for Trend Micro. “This new cybercriminal market shows how criminals are using cloud technologies to compromise you. Which also means a business is not exempt from this attack method if they only use on-prem services. All organizations will need to double down on preventative measures and ensure they have the visibility and controls needed to react fast to any incidents that occur.”

Once access is purchased for logs of cloud-based stolen data, the purchaser will use the information for secondary infection. For example, Remote Desktop Protocol (RDP) credentials can be found in these logs and are a popular entry point for criminals targeting enterprises with ransomware.

Storing terabytes of stolen data in cloud environments has similar appeal for criminal businesses as it does for legitimate organizations. Cloud storage offers scalability and speed that provides more computing power and bandwidth to optimize operations.

Access to these logs of cloud data are often sold on a subscription basis for as much as $1,000 per month. Access to a single log can include millions of records, and higher prices are earned for frequently updated data sets or the promise of relative exclusivity.

With ready access to data in this way, cybercriminals can streamline and accelerate execution of attacks and potentially expand their number of targets. The result is to optimize cybercrime by ensuring threat actors who specialize in specific areas—say cryptocurrency theft, or e-commerce fraud—can get access to the data they need: quickly, easily and relatively cheaply.

The Trend Micro report warns that in the future, such activity could even give rise to a new type of cybercriminal—an expert in data mining who uses machine learning to enhance pre-processing and extraction of information to maximize its usefulness to buyers. The overall trend will be towards standardization of services and pricing, as the industry matures and professionalizes. 

Related Posts

Introduction to Data Visualization Tools and what is the Types of Data Visualization Tools

Introduction to Data Visualization Tools Data visualization tools are essential when it comes to presenting complex data in an easy-to-understand format. With the increased reliance on data-driven Read More

Read More

What is Data Transformation and Key Features and Benefits of Data Transformation Tools

An Introduction to Data Transformation Data transformation is the process of converting data from one format to another format to meet specific needs or requirements. It involves Read More

Read More

What is Data Cleaning and What are the Importance of Data Cleaning Tools

What is Data Cleaning? Simply put, data cleaning is the process of identifying and correcting errors, inconsistencies, and inaccuracies in a dataset. It is a crucial step Read More

Read More

What is Data Mining and what is the Future of Data Mining Tools

Introduction to Data Mining Tools Data mining is the process of discovering hidden patterns and insights in large datasets. It involves the use of statistical and mathematical Read More

Read More

Trending Report: Lifesciences Data Mining And Visualization Market Wrap: Now Even More Attractive| Keyplayers- Tableau Software, SAP SE, IBM, SAS Institute

Source – https://ksusentinel.com/ (Version 2021) Lifesciences Data Mining And Visualization Market report published by Stratagem Market Insights is an in-depth analysis of the market covering its size, share, value, growth Read More

Read More

KDD in data mining assists data prep for machine learning

Source: searchenterpriseai.techtarget.com A machine learning application’s value is dependent on the quality of data used to train and deploy it. Organizations are responsible for creating or acquiring Read More

Read More
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x