March 7, 2024

News

Cyber Defense Agencies from Multiple Countries Release Cloud Computing Threat Advisory

The cyber defence agencies from Australia, New Zealand, the United Kingdom, and the United States issued a joint alert Monday on increased attempts from a cyber espionage group “almost certainly” tied to Russian intelligence agencies to target corporate and government systems using cloud computing services.

Previously, the cybercrime group APT29, tied to Russian intelligence services, targeted government agencies, think tanks, healthcare organizations, and energy companies. The new alert expands the target list to aviation, education, law enforcement, local and state councils, government financial departments, and military organisations.

While the alert is based on new and recent information, cloud computing as a threat vector is by no means a novel concept. Our editor, Megan Gates, wrote about a similar warning from the U.S. agency—the Cybersecurity and Infrastructure Security Agency (CISA)—three years ago, followed by another article later in the year on threats to the cloud. Among the tactics featured in those Security Management articles from 2021 are phishing schemes to steal credentials, pass-the-cookie attacks to bypass multifactor authentication, and vulnerabilities to third-party IT systems in use at an organisation.

The new alert highlights additional ways the nefarious actors are gaining access due to poor password security measures, multifactor bypass techniques, and compromised IT controls. Specifically, it discusses the following vulnerabilities:

They use dormant accounts to gain access and prolong the risk and exposure of a cyber incident. As part of an attack, they find inactive email accounts. When the organization pushes a password reset as part of its incident response, the criminals use the dormant account to reset password credentials, thereby regaining system access.

They gain access by using service accounts—a kind of account that runs in IT systems without human intervention and is used to run applications and other IT processes. The malicious actors use brute force tactics and password spraying to access these service accounts, which they then use to plant malicious code and grant additional access.

They use token authentication theft. Token authentication is one way to keep users from having to type in credentials for every application or process being used. Tokens are heavily used throughout an IT infrastructure, including cloud infrastructures. When malicious actors are able to gain token access, they can often bypass the need to obtain username and password credentials.

They capitalize on multifactor authentication fatigue. In this case, the cybercriminal has used phishing, password spraying or brute force, or some other way to gain a user’s credentials. However, the criminal is stymied by two-factor authentication. In this case, the criminal continually attempts to login sending continuous two-factor notices to a user’s device, hoping that the user will get tired of the notifications and just grant access. Once bypassed a first time, the criminal can then reset the two-factor device to one they control.

They mask their IP to appear legitimate. With the rapid dramatic increase of work-from-home, one cybersecurity tool has become less effective. Some network defences use IP addresses as indicators of compromise. In the past, just the number of remote users could cause an alarm. As the number jumped, defences began looking at the addresses themselves and ignoring ones from residential broadband customers. Criminals have adjusted by using residential proxies to hide their IP source.

CISA noted in its release that the damage a threat actor can cause once they have compromised an organization’s cloud systems is significant. They also said it is critical to close off these initial access vectors to keep them from getting into the cloud. They also referred U.S. federal agencies to CISA’s Secure Cloud Business Applications Project.

Source: https://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2024/february/cyber-defense-agencies-issue-cloud-computing-alert/

Next Post

Daniel Fleetwood

Business Development Manager

Technology, properly harnessed, can have a transformative impact on business and society. But technology alone is not enough; my purpose is to understand your goals and your business needs and then align the very best technology and service to help you reach those goals. And the reason we deliver consistent success is because we work with organisations that align with our values.

Michael Kovalik

Senior Technical Consultant

Technology, properly harnessed, can have a transformative impact on business and society. But technology alone is not enough; my purpose is to understand your goals and your business needs and then align the very best technology and service to help you reach those goals. And the reason we deliver consistent success is because we work with organisations that align with our values.

Geoff Boreland

Managing Director

Technology, properly harnessed, can have a transformative impact on business and society. But technology alone is not enough; my purpose is to understand your goals and your business needs and then align the very best technology and service to help you reach those goals. And the reason we deliver consistent success is because we work with organisations that align with our values.