logo
#

Latest news with #Halbumn

Top Cloud Malware Attacks Businesses Should Know About
Top Cloud Malware Attacks Businesses Should Know About

Time Business News

time21-07-2025

  • Time Business News

Top Cloud Malware Attacks Businesses Should Know About

Cloud computing is changing how we do business with higher flexibility, scalability, and cost savings than traditional infrastructure. However, this is providing new opportunities for criminals who are eternally looking to exploit weaknesses in cloud environments. Cloud malware is no longer a theoretical threat that persists in the cloud; it is using traditional security controls and lives in the same approved by your teams every day. The techniques that malware is using to deliver exploits through cloud environments are changing quickly and are becoming increasingly untraceable. Knowing how to protect your data from malware is not just good information; it is essential information that can be the difference between securing your operation and a catastrophic breach of sensitive data. One of the most prevalent attackis to upload dangerous files to reputable and known cloud storage services; including Google Drive, Dropbox, or Microsoft OneDrive; none of which receive the same level of security scrutiny as email. Cloud storage services do not require the traditional context of personal trust; they are inherently trusted by the users of the service. The danger is when those infected files are shared internally, amongst users, or externally with clients and partners. One document shared Ida file that has malware and is shared through your trusted cloud RFID cloud storage service can rapidly spread through the entirety of your organization, especially if your users are downloading and executing files without any validation. Most typical Halbumn security toolset region bind Found are usually overly stretched and unable to detect threats commingling in these environments because these platforms are perceived as trusted environments. Too many security solutions do not put the same effort into scanning files in the cloud that they put into scanning files that are email attachments or downloads from dubious sites. What you need to do is implement a comprehensive scanning solution that is designed specifically for cloud storage platforms that can detect suspicious content during the upload process and avoid spreading malicious files around your organization. Phishing campaigns aimed straight at cloud service credentials have evolved to be extremely sophisticated. Attackers create incredibly convincing fake log-in webpages, that mimic popular services like Office 365, Google Workspace, or Salesforce, leading employees to enter their username and password into the attacker controlled webpages. Once the attacker gets the stolen credentials, they can access your cloud accounts with no security alerts that would typically trigger for traditional security. The attacker can then use the information for many pernicious purposes – install malware, steal sensitive documentation, access communications between users, or even act as an authenticated user to launch attacks on other systems. These attacks provide great appeal to cybercriminals because the activity looks to external observers as if it is legitimate activity by a legitimate user. Standard security monitoring is unlikely to flag fallback activity suspicious because it is likely coming from an authenticated user with permission to access the data. So, yes, in addition to cyberattack exploitation of business communications and sensitive information of a business, when an attacker can get to the credentials and gain access to cloud-based systems they are likely in and permitted because they are (alternatively) logged into your cloud accounts! Multi-factor authentication is your best defense against credential based attacks. Even if they get your password, they will still need access to the second authentication process for log-in to their victim's system! Fileless malware is one of the more aggregated and sophisticated threats to cloud environments. As opposed to conventional executable files, these attacks run fully in system memory utilizing legitimate system tools and processes to execute malicious actions. In cloud environments, fileless attacks often exploit PowerShell scripts, Windows Management Instrumentation, or other administrative tools that are built-in to the system to run malicious code. Consequently, these scripts can remain undetected for long periods without leaving the conventional file signatures that antivirus usually looks for. Traditional antivirus solutions struggle significantly with fileless threats because there are no malicious files to scan. Furthermore, because the attacks run using legitimate system processes and tools, active detection will be extremely challenging with signature security-based forms of protection. Defense against fileless threats will require functionality for behavioral monitoring combined with threat intelligence that allows for risk patterns and behavioral anomalies, rather than just using file-based detection. Functionalities like behavioral monitoring can analyze system behavior to see when legitimate tools are being used maliciously. Software-as-a-Service integrations have created another attack vector that many organizations do not consider. Attackers create an application that looks legitimate and asks for OAuth permissions or other forms of integration access to popular platforms such as Slack, Microsoft Teams, or Google Workspace. Once a user accepts the integration, the attacker can gain access using the application's permissions without direct credential theft. The attacker could read emails, access files, read communications, or simply abuse the integration to get malicious software into the organization's environment. These attacks are particularly effective because malicious applications are often presented professionally, requesting reasonable permissions that look acceptable. For example, a user may not realize that by allowing an integration, they are granting access to an attacker, which then enables the attacker to operate in their cloud environment using real application credentials. Regularly reviewing authorized SaaS integrations should be included in the organization's standard security measures. Additionally, organizations should audit what applications have permission to access their systems, those permissions, and if the integrations are still needed and trusted. Cloud malware has progressed from being a niche concern to being a serious threat that affects small and large businesses. From fileless attacks that hide in plain sight to compromised SaaS integrations that are abusing legitimate permissions, cybercriminals are finding cunning means of infiltrating cloud environments. The solution to protection is remaining alert, educating your team on emerging threats, and implementing advanced security tools that are specifically built for cloud platforms. Understanding the threats and putting measures in place to limit exposure will help businesses proactively protect their resources and maintain their operational continuity. TIME BUSINESS NEWS

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store