Hackers Exploiting 'any/any' Communication Configs in Cloud Services to Host Malware

This permissive configuration essentially creates an open gateway for threat actors, enabling unrestricted data exfiltration to attacker-controlled cloud instances and facilitating the deployment of malicious payloads from trusted cloud services that can trick users into downloading malware. When organizations configure their networks to allow unrestricted communication with cloud providers, they inadvertently create a security blind spot that malicious actors can exploit. These misconfigurations allow attackers to establish command-and-control infrastructure within trusted cloud environments, making detection significantly more challenging as the malicious traffic blends with legitimate business communications. Beyond simple malware hosting, Veriti’s research identified numerous cases where cloud platforms serve as command-and-control (C2) servers, allowing adversaries to remotely control infected systems. Organizations should deploy cloud-native security solutions capable of monitoring for suspicious activities within their cloud environments and implement comprehensive logging to identify potential data exfiltration attempts. Over 40% of networks allow “any/any” communication with at least one major cloud provider, creating significant security vulnerabilities for organizations worldwide. Security teams often whitelist major cloud providers, further complicating the identification of malicious activities originating from these trusted sources. To mitigate these emerging threats, security experts recommend implementing strict network rules that define explicit parameters for cloud communications rather than allowing “any/any” configurations. Veriti has uncovered a concerning trend where cybercriminals are actively exploiting misconfigured cloud services to distribute malware and control compromised systems. In one documented case, threat actors distributed malware through Amazon Web Services (AWS) S3 buckets, with payload locations such as “hxxps://dctdownload.s3.amazonaws[.]com/grabs/s3_n..Jexe” being used to host malicious executables. The use of legitimate cloud infrastructure helps attackers evade traditional security controls that might otherwise flag suspicious domains. The research uncovered a concerning pattern of cloud platforms being systematically exploited as command-and-control hubs across major providers. Forensic analysis of recent attacks has revealed multiple sophisticated malware campaigns specifically designed to leverage cloud storage for payload delivery. The abuse spans multiple cloud providers, with different malware families preferring specific cloud environments for their operations. Regular security assessments focusing specifically on cloud service configurations can help identify and remediate these dangerous misconfigurations before they can be exploited. Security researchers have observed Sliver being used in conjunction with Rust-based malware such as KrustyLoader to establish persistent backdoors in compromised environments. The research also documented specific malware strains commonly distributed through cloud infrastructure. Meanwhile, Alibaba Cloud infrastructure has been linked to Pupy RAT (8.210.107.12035.2, 41.106.118) and Brutal Ratel (8.212.128.240) command and control activities. The attackers hosted their payloads on AWS S3 buckets at locations like “f8a076dcf0384e1f93bded36c8a9646c.s3.amazonaws./com” – again leveraging trusted infrastructure to distribute malware. Each of these threats leverages the perceived legitimacy of cloud services to evade detection and establish persistence within victim networks.

This Cyber News was published on cybersecuritynews.com. Publication date: Sun, 09 Mar 2025 14:15:06 +0000


Cyber News related to Hackers Exploiting 'any/any' Communication Configs in Cloud Services to Host Malware

Multi-Cloud vs. Hybrid Cloud: The Main Difference - The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and they're sometimes baffled by the distinction between multi-cloud and hybrid cloud. Although the public cloud infrastructure and public cloud ...
1 year ago Techtarget.com
Hackers Exploiting 'any/any' Communication Configs in Cloud Services to Host Malware - This permissive configuration essentially creates an open gateway for threat actors, enabling unrestricted data exfiltration to attacker-controlled cloud instances and facilitating the deployment of malicious payloads from trusted cloud services that ...
7 hours ago Cybersecuritynews.com
What is a Cloud Architect and How Do You Become One? - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy. This includes cloud adoption plans, cloud application design, and cloud management and monitoring. Cloud architects oversee application ...
1 year ago Techtarget.com
2023 Cloud Security Report - Security concerns remain a critical barrier to cloud adoption, showing little signs of improvement in the perception of cloud security professionals. Cloud adoption is further inhibited by a number of related challenges that prevent the faster and ...
1 year ago Cybersecurity-insiders.com
The 10 Best Cloud Security Certifications for IT Pros in 2024 - Many professionals seeking a career in cloud security turn to certifications to advance their learning and prove.... their knowledge to potential employers. The number of cloud security certifications has increased in recent years making it difficult ...
1 year ago Techtarget.com
Cloud Security: Stats and Strategies - An interesting aspect in O'Reilly's latest Cloud Adoption report based on a global survey conducted is that 90% of the responders are using the cloud to support their business. One of the key takeaways from the State of the Cloud report from Flexera ...
1 year ago Feeds.dzone.com
Top Cloud Security Issues: Threats, Risks, Challenges & Solutions - Cloud security issues refer to the threats, risks, and challenges in the cloud environment. To combat these cloud security issues, develop a robust cloud security strategy that addresses all three to provide comprehensive protection. Cloud security ...
9 months ago Esecurityplanet.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
1 year ago Esecurityplanet.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
9 months ago Esecurityplanet.com
Benefits and challenges of managed cloud security services - Too many organizations lack the in-house cloud security expertise and resources needed to protect cloud assets effectively. One option to address these challenges is managed cloud security. Outsourcing cloud security to a third party not only helps ...
1 year ago Techtarget.com
Securing Student Data in Cloud Services - In today's educational landscape, securing student data in cloud services is of utmost importance. One key aspect of securing student data in cloud services is ensuring proper data encryption. This article explores the various challenges and best ...
1 year ago Securityzap.com
What is a cloud application? - A cloud application, or cloud app, is a software program where cloud-based and local components work together. Cloud application servers are typically located in a remote data center operated by a third-party cloud services infrastructure provider. ...
11 months ago Techtarget.com
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization - The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments - a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. As organizations increase ...
10 months ago Crowdstrike.com
What Is Cloud Workload Security? Ultimate Guide - Cloud workload security, or cloud workload protection, refers to the tools and policies used to protect apps, services, and resources that run on cloud infrastructure. Your organization can manage cloud workload security through coordination across ...
8 months ago Esecurityplanet.com
Comprehensive Cloud Monitoring Platforms: Ensuring - Platforms for comprehensive cloud monitoring come into play in this situation. In this article, we will explore the significance of comprehensive cloud monitoring platforms and delve into some leading solutions available in the market today. ...
1 year ago Feeds.dzone.com
What is cloud load balancing? - Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources. Cloud load balancing helps enterprises achieve ...
11 months ago Techtarget.com
Top 10 Best Dynamic Malware Analysis Tools in 2025 - FireEye Malware AnalysisEnterprise-grade solution, zero-day detection, integration with threat intelligence, memory forensics.Enterprise-grade malware detection and forensicsPricing details not publicly available; contact for quote.Yes6. Detux ...
1 week ago Cybersecuritynews.com
7 Considerations for Multi-Cluster Kubernetes - A hybrid cloud is a cloud computing environment that combines public and private clouds, allowing organizations to utilize the benefits of both. In a hybrid cloud, an organization can store and process critical data and applications in its private ...
1 year ago Feeds.dzone.com
Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security - We're thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes ...
8 months ago Crowdstrike.com
How to Extract Malware Configurations in a Sandbox - The most sought-after source of these indicators is malware configurations. Malware Sandboxing Leader ANY.RUN handles the heavy lifting of phishing and malware analysis for SOC and DFIR teams and also helps 300,000 professionals use the platform to ...
1 year ago Gbhackers.com
Managing the Requirements of a MultiCloud System - The use of digital technology has advanced to include cloud computing in the delivery of services, cost reduction, increased agility, and improved security. The emergence of various cloud solutions has led organizations to move their assets from ...
2 years ago Blog.isc2.org
4 types of cloud security tools organizations need in 2024 - By now, organizations know which on-premises security tools they need, but when it comes to securing the cloud, they don't always understand which cloud security tools to implement. While many traditional on-premises tools and controls work in the ...
10 months ago Techtarget.com
Middle East CISOs Fear Disruptive Cloud Breach - As organizations in the Middle East increasingly adopt cloud services, business leaders worry that their cloud-security measures are falling short. Running in the Cloud The worries arise as organizations in the Middle East accelerate their cloud ...
1 year ago Darkreading.com
Cloud Security: Ensuring Data Protection in the Cloud - Data Encryption: Protecting sensitive data is a top priority in cloud security. Cloud security is of utmost importance when it comes to protecting and ensuring the confidentiality of data stored and transmitted in the cloud. Data protection in the ...
1 year ago Securityzap.com

Cyber Trends (last 7 days)