The Growing Threat of Malware Concealed Behind Cloud Services

Cybersecurity threats are increasingly leveraging cloud services to store, distribute, and establish command and control (C2) servers, such as VCRUMS stored on AWS or SYK Crypter distributed via DriveHQ. This shift in strategy presents significant challenges for detection and prevention, as cloud services provide scalability, anonymity, and resilience that traditional hosting methods lack.

Over the past month, FortiGuard Labs has been monitoring botnets that have adopted this strategy, abusing cloud services to enhance their malicious capabilities. These botnets, such as UNSTABLE and Condi, have been observed leveraging cloud storage and computing services operators to distribute malware payloads and updates to a broad range of devices […]

Click here to view original web page at www.fortinet.com

Most Recent Posts

  • All Post
  • Cisco
  • CkeckPoint
  • Commvault
  • Fortinet
  • Happiness
  • Huawei
  • Lenovo
  • NetApp
  • PECB Training
  • Press Release
  • VMware
    •   Back
    • Information Security
    • Cybersecurity
    • Continuity Resilience and Recovery
    • Governance Risk and Compliance
    • Privacy and Data Protection

Press Release

  • All Post
  • Cisco
  • CkeckPoint
  • Commvault
  • Fortinet
  • Happiness
  • Huawei
  • Lenovo
  • NetApp
  • PECB Training
  • Press Release
  • VMware
    •   Back
    • Information Security
    • Cybersecurity
    • Continuity Resilience and Recovery
    • Governance Risk and Compliance
    • Privacy and Data Protection

Categories