Tag : cloud

10 attack reports | 0 vulnerabilities

Attack Reports

Title Published Tags Description Number of indicators
Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries Sept. 11, 2024, 8:18 p.m. The Scattered Spider cybercriminal group is targeting cloud infrastructures in the insurance and financial sectors using advanced… 12
Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments Aug. 16, 2024, 8:08 a.m. Unit 42 researchers uncovered an extortion campaign that compromised and extorted multiple victim organizations by leveraging exp… 37
Hackers Leveraging OneDrive Or Google Drive To Hide Malicious Traffic Aug. 7, 2024, 4:11 p.m. Cyber threat actors, including nation-state groups, are utilizing legitimate cloud services like Microsoft OneDrive and Google Dr… 20
Cloud Cover: How Malicious Actors Are Leveraging Cloud Services Aug. 7, 2024, 11:18 a.m. In recent times, there has been a notable rise in the exploitation of legitimate cloud services by threat actors, including natio… 20
DERO cryptojacking adopts new techniques to evade detection June 14, 2024, 10:11 a.m. This report examines the threat actors behind a 2023 cryptojacking campaign targeting misconfigured Kubernetes clusters, focusing… 18
APT Attacks Using Cloud Storage June 11, 2024, 10:09 a.m. The report describes a malicious campaign where threat actors utilize cloud services like Google Drive, OneDrive, and Dropbox to … 1
Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers June 7, 2024, 7:48 a.m. This report details a cryptojacking campaign exploiting exposed Docker remote API servers. Threat actors employ the cmd.cat/chatt… 7
Analysis and Detection of CLOUD#REVERSER: An Attack Involving Threat Actors Compromising Systems Using A Sophisticated Cloud-Based Malware May 22, 2024, 7:39 a.m. Securonix Threat Research has uncovered a sophisticated malware campaign, dubbed CLOUD#REVERSER, that leverages popular cloud sto… 16
Attackers exploiting new critical vulnerabilities on Kubernetes clusters May 21, 2024, 11:20 a.m. Microsoft security researchers have uncovered an attack campaign exploiting recently disclosed critical vulnerabilities in the Op… 6
Analysis of APT Group's Use of Malicious LNK Files to Deliver RokRat Attack April 29, 2024, 6:40 p.m. The report details a recent cyber attack campaign by the APT-C-28 (ScarCruft) group, known for targeting organizations in Korea a… 3