How Cloud Services Are Exploited for Cyber-Espionage - Infos

How Cloud Services Are Exploited for Cyber-Espionage - Infosecurity Magazine


From an information security perspective, 2020 was a complicated year. Not only did the pandemic affect the threat landscape, but double extortion ransomware attacks have become the new normal. To top the year off, in December the massive supply-chain campaigns were discovered, whose real extent is not yet clear.
An additional thing of note from last year is the emergence of the weaponization of cloud services by state-sponsored groups. Exploiting the cloud for criminal purposes such as phishing and malware delivery (the Ryuk ransomware is probably the most noteworthy) is now a consolidated trend. However, some recent campaigns show how cloud exploitation is becoming increasingly common, even in cyber-espionage operations, where legitimate services are used to deliver the malicious payload within a multi-stage kill chain, adding an additional layer of evasion.

Related Keywords

United States , Iran , America , Iranian , Gaza Cybergang , Google , A Cocktail Of Cloud Services For Molerats , Facebook , Middle East , Cobalt Strike , Cloud Services , Google Drive , Middle Eastern , Remote Access Tool , Microsoft Word , Bandook Loader , Process Hollowing , Internet Explorer , ஒன்றுபட்டது மாநிலங்களில் , இரண் , அமெரிக்கா , இராநியந் , கூகிள் , முகநூல் , நடுத்தர கிழக்கு , கோபால்ட் வேலைநிறுத்தம் , மேகம் சேவைகள் , கூகிள் இயக்கி , தொலைநிலை நுழைவு கருவி , மைக்ரோசாஃப்ட் சொல் , இணையதளம் ஆய்வுப்பணி ,

© 2025 Vimarsana