Organized attacks on cloud infrastructure and software supply chain increase


A brand new menace report from Aqua Safety reveals a rising, organized and more and more subtle sample of assaults on cloud native infrastructure.

Whereas most assaults uncovered by Workforce Nautilus, Aqua’s cybersecurity analysis group, had been geared toward abusing public cloud compute sources for cryptocurrency mining, the strategies used additionally open the door for higher-value targets that look to use safety gaps in container software program provide chains and runtime environments.

The group noticed 16,371 assaults because the starting of 2020 that it tracked again to a number of places throughout the globe. 70.7 % of the assaults had been constructed to mislead and conceal their malicious nature. This included the usage of malicious photographs designed to execute scripts geared toward downloading additional parts from an exterior distant supply. 95 % of the pictures had been designed to hijack sources for the only objective of cryptocurrency mining, whereas 5 % had been set to launch a DDoS assault.

Between June 2019 and January 2020, the typical variety of assaults towards Aqua’s honeypots every day elevated 50 %, however since January till the tip of June 2020 the variety of assaults per day exploded, rising by greater than 250 %.

“The assaults we noticed are a major step up in assaults concentrating on cloud native infrastructure. We anticipate an additional improve in sophistication, the usage of evasion strategies and variety of the assault vectors and goals, because the widespread the usage of cloud native applied sciences makes them a extra profitable goal for dangerous actors,” says Idan Revivo, head of Workforce Nautilus at Aqua. “Safety groups are suggested to take the suitable measures each of their pipelines in addition to runtime environments, to detect and intercept such makes an attempt.”

You will discover out extra within the full report, out there from the Aqua web site.

Picture Credit score: frank_peters/ Shutterstock


Please enter your comment!
Please enter your name here