I don't think that there can be many of us who cannot see this coming, the bigger the target the more tempting it is and if you put that together with its quickly growing popularity it seems inevitible what it is going to happen.
9th January 2017 By Tara Seals
The balkanization of the internet and the movement of data to the cloud will define the 2017 cybersecurity landscape, according to researchers—and we should brace for a major compromise of a cloud provider.
Cloud-based methods of persistence and compromise have been presented at many security conferences, including BlackHat and Defcon this past year.
“In 2017, we expect to see the leading security organizations begin to catch malicious actors breaching their cloud management infrastructure,” said Aaron Shelmire, principal threat researcher at Anomali, via email. “Additionally, we expect to see malware purpose-built to capture cloud services credentials, similar to the banking trojans that are able to intercept two-factor Authentication input. After the malicious actors gain access to cloud infrastructure, we will see new methods of persistence established via the cloud management profiles. This activity will present a significant challenge for understanding Intrusion timelines.”
Full Article
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.