Threat actors use the power of Microsoft Azure and AWS to spread RATs

Everyone’s learning how to tap into the power of the cloud, including malicious individuals looking to spread malware to unsuspecting parties. Take, for example, the recent campaign identified by Cisco Talos wherein threat actors have been distributing Netwire, Nanocore, and AsyncRATs by utilizing AWS and Microsoft Azure.

The idea behind malicious parties using major cloud services is that it saves them time, money, and effort when it comes to setting up attack infrastructure. There’s also the added benefit of the cloud making their actions harder to trace and track.

As for why one should be afraid of RATs scurrying through the cloud and landing inside their environment: RAT stands for “Remote Administration Tool.” Once it gets in, it can execute commands you never consented to and siphon sensitive information.

For the specific campaign Cisco Talos analyzed, the RAT threat starts as many do: With a phishing email packing a nasty attachment. Once that attachment’s loader starts running its script, it links up with a server, the likes of which may be hosted via AWS or Azure.

You can read the full report over at the Talos Intelligence blog, should you want to learn the in-depth technical details of the danger. If you’re not interested in that, then it’s important to, at the very least, digest the main takeaway of the report: “Organizations should be inspecting outgoing connections to cloud computing services for malicious traffic,” Talos Cisco warns. “The campaigns described in this post demonstrate increasing usage of popular cloud platforms for hosting malicious infrastructure.”

Leave a Reply

Discover more from Ultimatepocket

Subscribe now to keep reading and get access to the full archive.

Continue reading