• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
linux based multi cloud environments facing increased ransomware attacks

Linux-based multi-cloud environments facing increased ransomware attacks

You are here: Home / General Cyber Security News / Linux-based multi-cloud environments facing increased ransomware attacks
February 9, 2022

Shutterstock

Study from VMware Threat Examination Device (VMware TAU) has unveiled cyber attackers are more and more concentrating on Linux-dependent multi-cloud environments to install malware this kind of as ransomware, distant entry instruments (RATs), and cryptominers.

Ransomware operators have developed not too long ago and are now targeting Linux host illustrations or photos utilised to execute workloads in virtualised environments, the scientists claimed, with typical ransomware family members noticed in compromised environments which includes Defray777 and DarkSide – the latter of which was applied in the notorious Colonial Pipeline hack in 2021.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper take secure and enxrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The conclusions mark an emerging pattern whereby attackers are ever more concentrating on Linux to acquire a foothold in a enterprise to supply financially-inspired malware strategies.

VMware TAU also stated Linux-based malware is starting to be more “advanced” and “devastating” with attackers scoping out providers tackling “economical gatherings” to incentivise payments, as very well as fully compromising cloud environments in advance of encrypting documents to make the incident response extra tough.

The researchers pointed out that classic malware countermeasures are commonly focused on defense for Windows environments, indicating enough awareness isn’t remaining compensated to Linux consequently leaving community and non-public clouds a lot more vulnerable.

In accordance to VMware TAU, much more than 75% of the most popular websites currently are run by Linux and it’s also the most well-known cloud operating procedure, comprising a core element of a business’ digital infrastructure. 

“Cyber criminals are substantially growing their scope and adding malware that targets Linux-primarily based running methods to their attack toolkit in get to maximise their impression with as small hard work as possible,” stated Giovanni Vigna, senior director of risk intelligence at VMware.

“Attackers look at both of those community and personal clouds as substantial-value targets thanks to the accessibility they deliver to critical infrastructure providers and confidential knowledge,” he extra.

RATs such as the commercial penetration tests resource Cobalt Strike and a Linux-based re-implementation of a Beacon payload relevant to it, recognized as Vermillion Strike, are frequently used as the key implant in cyber attacks on multi-cloud environments.

Cobalt Strike is a device utilised for good by penetration testers and in red crew routines to simulate authentic attacks but is usually misused by cyber criminals for destructive hacking functions.

Vermillion Strike was discovered in 2021 and is a malware that lets operators to communicate with victims’ machines following infection by way of a command and control (C2) server. It will allow attackers to execute several steps including executing commands and modifying documents, generating it an excellent tool for attackers on the lookout to encrypt data files in extortion campaigns.

“In order to attain control and persist in just an ecosystem, attackers glance to put in an implant on a compromised method that offers them partial command of the device,” explained VMware TAU. “Malware, web shells, and Remote Obtain Resources (RATs) can all be implants utilized by attackers in a compromised technique to permit for remote obtain.”

VMware TAU also observed in its research that cryptomining was also an issue affecting organisations functioning multi-cloud environments, with Monero becoming the most well-known asset getting mined applying victims’ infrastructure. 

It follows a very similar claim created by Google Cloud just lately it found a big range of compromises of its customers’ environments generally led to cryptominers staying put in to harness scalable compute without the need of incurring any charge to the attackers.

“Considering that we conducted our evaluation, even a lot more ransomware households had been noticed gravitating to Linux-based malware, with the likely for added attacks that could leverage the Log4j vulnerabilities,” said Brian Baskin, supervisor of danger study at VMware.

“The conclusions in this report can be employed to superior recognize the character of Linux-based malware and mitigate the increasing threat that ransomware, cryptomining, and RATs have on multi-cloud environments. As attacks focusing on the cloud carry on to evolve, organisations must adopt a Zero Trust tactic to embed security in the course of their infrastructure and systematically tackle the danger vectors that make up their attack surface.”


Some parts of this write-up are sourced from:
www.itpro.co.uk

Previous Post: «foreign office hit by “serious cyber security incident” Foreign Office hit by “serious cyber security incident”
Next Post: Google claims default 2FA reduced account breaches by 50% google claims default 2fa reduced account breaches by 50%»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • NortonLifeLock and Avast merger could reduce competition, CMA warns
  • Thousands of Mobile Apps Expose User Data Via Cloud Misconfigurations
  • NSW ditches e-voting system for 2023 election
  • Kaspersky Hits Back at “Politically Motivated” BSI Advisory
  • Germany advises against using Kaspersky software due to hacking risk
  • CISA: Fix MFA and Patch Promptly to Stop Russian Attackers
  • German Government Warns Against Using Russia’s Kaspersky Antivirus Software
  • Multiple Flaws Uncovered in ClickHouse OLAP Database System for Big Data
  • Facebook Hit With $18.6 Million GDPR Fine Over 12 Data Breaches in 2018
  • Phony Instagram ‘Support Staff’ Emails Hit Insurance Company

Copyright © TheCyberSecurity.News, All Rights Reserved.