Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Cybercriminals Use Cloud Technology to Accelerate Business Attacks

Trend Micro Research finds terabytes of stolen data sold in cloud logs making cybercrime more widespread and effective

Trend Micro Incorporated, the leader in cloud security, has identified a new class of cybercrime. Criminals are using cloud services and technology to speed up attacks, which decreases the amount of time enterprises have to identify and respond to a breach.

Trend Micro Research found terabytes of internal business data and logins for popular providers like Amazon, Google, Twitter, Facebook, and PayPal offered for sale on the dark web. This data is sold via access to the cloud logs in which it is stored. This results in more stolen accounts being monetized, and the time from initial data theft to stolen information being used against an enterprise has decreased from weeks to days or hours.

Recommended AI News: PlaySight Announces Updated Product Portfolio With GO And PRO Sports Video Platforms  

“The new market for access to cloud logs ensures stolen information can be used more quickly and effectively by the cybercrime community—that’s bad news for enterprise security teams,” said Robert McArdle, director of forward-looking threat research for Trend Micro. “This new cybercriminal market shows how criminals are using cloud technologies to compromise you. Which also means a business is not exempt from this attack method if they only use on-prem services. All organizations will need to double down on preventative measures and ensure they have the visibility and controls needed to react fast to any incidents that occur.”

Once access is purchased for logs of cloud-based stolen data, the purchaser will use the information for secondary infection. For example, Remote Desktop Protocol (RDP) credentials can be found in these logs and are a popular entry point for criminals targeting enterprises with ransomware.

Related Posts
1 of 40,639

Storing terabytes of stolen data in cloud environments has similar appeal for criminal businesses as it does for legitimate organizations. Cloud storage offers scalability and speed that provides more computing power and bandwidth to optimize operations.

Recommended AI News: Nightfall AI Joins CircleCI’s Partner Network To Bring Data Loss Prevention To Code Commits

Access to these logs of cloud data are often sold on a subscription basis for as much as $1,000 per month. Access to a single log can include millions of records, and higher prices are earned for frequently updated data sets or the promise of relative exclusivity.

With ready access to data in this way, cybercriminals can streamline and accelerate execution of attacks and potentially expand their number of targets. The result is to optimize cybercrime by ensuring threat actors who specialize in specific areas—say cryptocurrency theft, or e-commerce fraud—can get access to the data they need: quickly, easily and relatively cheaply.

The Trend Micro report warns that in the future, such activity could even give rise to a new type of cybercriminal—an expert in data mining who uses machine learning to enhance pre-processing and extraction of information to maximize its usefulness to buyers. The overall trend will be towards standardization of services and pricing, as the industry matures and professionalizes. 

Recommended AI News: Code42 Incydr Delivers Evolved Data Protection For Channel Partners

3 Comments
  1. Iron scrap market analysis says

    Scrap metal collectors Ferrous scrap transportation Iron scrap recycling

    Ferrous scrap pricing, Scrap iron reclamation operations, Scrap metal material recovery

  2. Scrap copper pickup says

    Copper scrap stock management Copper profile recycling Metal salvage services
    Copper cable scrap treatment, Scrap metal repurposing technologies, Copper scrap negotiations

  3. Metal scrap market forecasting Ferrous material recovery and processing Iron scrap refining

    Ferrous waste minimization, Iron scrap reclamation operations, Metal recovery industry

Leave A Reply

Your email address will not be published.