Cloud IoT-Malware has evolved to be more stealth-like than ever and open to almost anyone to carry out an attack. This democratization of the cybercrime ecosystem paves the way for new, unskilled attackers to enter the malware distribution arena.
New breed of hackers: Hacking as we knew it has changed. While in the beginning it was the handiwork of overenthusiastic individuals honing their cyber-skills by finding loopholes in live systems, hackers today are financially motivated and run their operations under the aegis of organized criminal organizations, according to the 2019 Security Report by Checkpoint Software Technologies Ltd, released this month. The hacker arrested by the US department of justice in September 2018 for the WannaCry ransomware attack of 2017, for instance, was part of a criminal organization called the Lazarus Group with alleged links to the North Korean government.
Further, with more businesses moving their operations online, vast amounts of financial and critical business-related data is now stored in data centres. For cybercriminals, this is a huge opportunity as they can not only break into company systems and steal data but can take control and lock out the owners of their own systems. For instance, the Petya ransomware, which affected 2,000 enterprises in 65 countries, had locked users out of their own systems.
Hackers know what to target: According to Checkpoint, more than 10,000 different malicious files are detected per day while 700 malware families are being used on a daily basis. Initially, most of the ransomware attacks such as WannaCry and Petya didn’t have any specific target. Cybercriminals have changed tactics and are now striking at their most vulnerable point of the target.
Cloud is the weakest link: Cloud computing is an integral part of any enterprise’s operations. It allows stakeholders in the company to access their data from any location or device. To make this process less complicated, often the level of verification and security are not very stringent. This makes services running on the cloud more vulnerable to cyberattacks compared to on-premise services.
To break into cloud networks, hackers only need access to one of the employees’ email or computer account, which they acquire by sending a phoney mail (that might appear genuine) with a malicious link hoping the target will click on it. According to a 2018 report by Dome9., 18% of organizations were involved in cloud related security breaches in 2017.