Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » San
Global Security

San

AdminBy AdminMarch 17, 2025No Comments3 Mins Read
Cloud-Native Ransomware Attacks
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 17, 2025Hacker NewsCloud security / intelligence threats

Recovery attacks in the cloud

The latest Palo Alto Networks UNIT 42 report has shown that sensitive data is in a 66% cloud storage bucket. This data is vulnerable to the ransomware attacks. Institute of Sans Recently reported What these attacks can be carried out by abuse of cloud suppliers’ security and default settings.

“Only in the last few months, I have witnessed two different methods for the ransom attack, using nothing but legitimate cloud security functions,” Brandon Evans warns, security consultant and certified SANS instructor. Halcyon has opened an attack company that used one of Amazon S3 encryption mechanisms, SSE-C to encrypt each of the target buckets. A few months earlier, the security consultant Chris Pharis demonstrated how the attackers can commit a similar attack using another AWS security feature, KMS Keys with external key materials using simple scripts generated chatgpt. “It is clear that this topic is intended for both the subjects of the threat and the researchers,” Brandon notes.

To eliminate Cloud Ransomware, SANS recommends organizations:

  1. Understand the power and restrictions of control over security: Using cloud does not automatically make your security data. “The first cloud services that most people use are backup files such as OneDrive, Dropbox, iCloud and others,” Brandon explains. “Although these services usually have the default recovery capabilities, this is not the case for Amazon S3, Azure Storage or Google Cloud Storage. It is important for safety professionals to understand how these services work and not believe that the cloud will save them.”
  2. Blocking methods of encryption without support: AWS S3 SSE-C, AWS KMS External Key Material and similar encryption methods can be abused as the attacker has complete control over the keys. Organizations can use the identity and access policy (IAM) for the mandate of the encryption method used by S3, such as SSE-KMS using key materials located in AWS.
  3. Enable backup, version of objects and lock facilities: These are some elements of the integrity and availability for cloud repositories. None of them are included in the default for any of the large 3 cloud providers. When used properly, they can increase the chances that the organization can restore their data after the ransom attack.
  4. Balance of Security and Cost in Life Cycle Policy: These security features cost money. “Cloud vendors are not going to post your data versions or backups for free. At the same time, your organization is not going to give you a data security check,” Brandon says. Each of the large 3 cloud providers allows customers to determine the life cycle policy. These politicians allow organizations to automatically delete objects, versions and backups if they are no longer considered necessary. Remember, however, that attackers can also use a life cycle policy. They were used in the previously mentioned Attack company to urge the goals to pay ransom quickly.

To find out more, see Brandon’s broadcast: “The cloud will not save you from the ransom: That’s what happens” by visiting https://www.sans.org/webcasts/Cloud-wont-save

Interested in the additional tactics of mitigating the attacks in large 3 cloud providers? Check the Brandon Course, SEC510: Cloud Controls Control and Mitigations at Sans 2025 Orlando or lives on the Internet in April this April. This course is also available with Brandon later in the year in Baltimore, Doctor of Medical Sciences in June or Washington, Colombia County in July.

Found this article interesting? This article is a contribution to one of our esteemed partners. Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.