Get the latest tech news

The Growing Threat of Malware Concealed Behind Cloud Services


Cybersecurity threats are increasingly leveraging cloud services to store, distribute, and establish command and control (C2) servers. Over the past month, FortiGuard Labs has been monitoring botne…

This shift in strategy presents significant challenges for detection and prevention, as cloud services provide scalability, anonymity, and resilience that traditional hosting methods lack. Figure 2: Attack packetFigure 3: Downloader script "jaws"It includes multiple binary files for 13 architectures executed using the parameter “jaws.exploit.” The UNSTABLE Botnet is a Mirai variant that uses XOR to encode its configuration. Implementing a multi-layered security approach, including regular patching, updates, and network segmentation, is essential to isolate critical assets and mitigate potential breaches.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of malware

malware

Photo of growing threat

growing threat

Photo of cloud services

cloud services

Related news:

News photo

South Korean telecom company attacks torrent users with malware

News photo

Korean telco allegedly infected its P2P users with malware. KT may have had an entire team dedicated to infecting its own customers

News photo

Korean telco allegedly infected its P2P users with malware