Cybercriminals use cloud …

Cybercriminals use cloud …

Cyber Crime and Hunting Cyber Criminals

Contents

Cybercriminals use cloud technology to hack exchanges
CONTENT

  • Hackers use cloud technology to hack exchanges

  • You can buy access to millions of accounts at "black" market

  • Cloud technologies will be especially popular in the next 5 years

International consortium of news organizations, developing standards for transparency.

Trend Micro Incorporated, a leader in cloud security, has released its own analyst report that lists the main cybercriminals’ tools for hacking the servers of exchanges and other companies.

Cybercriminals use cloud ...

Hackers leak access to user accounts

Trend Micro Research has discovered terabytes of internal business data and logins for popular providers such as Amazon, Google, Twitter, Facebook In June 2019, Facebook announced preparations for the release of the Libra digital currency. The social networking project immediately caught the attention of … More and PayPal, which were put up for sale on the darknet. This data is sold through access to the cloud logs in which it is stored, which leads to an increase in the number of stolen accounts.

Cybercriminals use cloud ...

Further, scammers use these accounts to hack into the computer systems of enterprises, business structures and cryptocurrency exchanges. Most often, accounts in Google, Facebook, Twitter and others are used to hack systems..

Cybercriminals use cloud ...

“Access to cloud logs allows hackers to leverage stolen information — bad news for corporate security teams. Criminals use cloud technologies to get to users’ personal information, moreover, companies that only use on-prem services are also vulnerable, ”said Robert McArdle, director of advanced threat research at Trend Micro..

By purchasing access to logs of data stolen from the cloud, the buyer will use this information for secondary attacks. For example, in these logs, you can find Remote Desktop Protocol (RDP) credentials, which are a popular entry point for ransomware attackers attacking businesses..

Storing terabytes of stolen data in the cloud attracts criminals and good organizations alike. Cloud storage offers scalability and speed that provide more computing power and bandwidth to optimize performance.

Access to such logs is often sold by subscription for $ 1,000 a month. Access to a single journal can include millions of records that are updated and replenished from time to time.

With this access to data, cybercriminals can make attacks easier and faster and potentially increase the number of their victims. Thus, attackers who specialize in specific areas, such as stealing cryptocurrencies or scams in e-commerce, can gain access to the data they need: quickly, easily, and relatively cheaply..

Cloud technologies for good and for harm

Cloud technologies will become one of the main trends in technology development until 2025. This is the conclusion reached by analysts of the World Economic Forum (WEF). According to the analytical report, in the next five years, cloud specialists will be among the most in-demand in the labor market.

At the same time, cryptocurrency exchanges are already introducing cloud technologies into their work. For example, Binance has launched its own cloud service that opens up new opportunities for customers around the world. Binance Cloud Service Lets Build DeFi Products Decentralized Finance (DeFi) – this is financial services, technology-based blockchain that offer users access to open, efficient and … More powered by Binance Smart Chain and Ethereum, and work directly with leading payment service providers. Platforms built on Binance Cloud include cryptocurrency trading (spot, derivatives), local currency support.

The WEF experts are confident that in the next five years cloud technologies will penetrate many areas, including medicine, financial sector, logistics and others..

 

Disclaimer

All information, contained on our website, published in good faith and objectivity, and for informational purposes only. Reader yourself bears full responsibility for any actions, committed by him on the basis of information, obtained from our website.

Share Article

Share