The Honeymoon for Cloud Services Is Over


The cloud services you rely on are no longer as secure as they used to be. Once seemingly a safe haven for data and applications, attackers are increasingly leveraging cloud services for command and control—and the Symantec Threat Hunter Team predicts an unnerving upshoot in 2025.

The Microsoft breach by Russian nation-state actors is one instance of many that show how even widely trusted cloud service providers (CSPs) can fall victim to targeted attacks. The implications of this rising trend are great, both for CSPs and for the SaaS systems and apps they host. Recent breaches, like those impacting Ticketmaster and Santander, underscore the fact that organizations are exposed to cascading risks in digital supply chains.

Read more…
Source: Symantec


Sign up for our Newsletter


Related:

  • Leaseweb trying to restore service following cyberattack

    August 28, 2023

    Cloud provider Leaseweb was forced to take some of its critical systems down to mitigate the effects of an ongoing cyberattack. One of the world’s largest cloud and hosting providers, Leasweb contacted its customers to alert them it spotted “unusual” activity in some parts of its infrastructure. To minimize the potential damages and oust the unauthorized ...

  • Cyber Security & Cloud Expo Europe 2023 – Less Than Two Months To Go

    August 9, 2023

    Save the date and get ready for one of the most anticipated events in the tech and cyber community – Cyber Security & Cloud Expo Europe! This year’s expo will take place on 26-27 September at the renowned RAI Amsterdam, bringing together over 6,000 attendees from around the globe to explore the latest trends and innovations ...

  • Cryptojacking: Understanding and defending against cloud compute resource abuse

    July 25, 2023

    In cloud environments, cryptojacking – a type of cyberattack that uses computing power to mine cryptocurrency – takes the form of cloud compute resource abuse, which involves a threat actor compromising legitimate tenants. Cloud compute resource abuse could result in financial loss to targeted organizations due to the compute fees that can be incurred from the ...

  • A nasty Google Cloud bug could let hackers use it to launch attacks

    July 20, 2023

    Cybersecurity researchers from Orca Security have uncovered a new bug in the Google Cloud Build service which could allow threat actors to gain almost full access to Google Artifact Registry code repositories. The repercussions of the flaw, the researchers are saying in their report, are quite dire. The researchers named the vulnerability Bad.Build, saying it allows ...

  • Analysis of Storm-0558 techniques for unauthorized email access

    July 14, 2023

    As described in more detail in our July 11 blogs, Storm-0558 is a China-based threat actor with espionage objectives. Beginning May 15, 2023, Storm-0558 used forged authentication tokens to access user email from approximately 25 organizations, including government agencies and related consumer accounts in the public cloud. No other environment was impacted. Microsoft has successfully ...

  • Microsoft Azure and Outlook outages were caused by DDoS attacks

    June 19, 2023

    Microsoft has confirmed that outages to its Azure and Outlook services were caused by DDoS attacks, which the company puts down to the threat actor that it tracks as Storm-1359. This follows the tech giant’s new nomenclature for threats, whereby Storm denotes a group that is in development. Otherwise known as Anonymous Sudan, it is said ...