SentinelLabs Details Discovery of FBot Tool for Compromising Cloud Services

SentinelLabs today published a report identifying a Python-based tool that cybercriminals are using to compromise cloud computing and software-as-a-service platforms.
Alex Delamotte, senior threat researcher at SentinelLabs, said FBot is used to take over Amazon Web Services accounts in addition to targeting PayPal and other various SaaS applications, such as Office365, she added.
Specifically, FBot contains multiple utilities, including an IP address generator and port scanner.
The tool itself appears to be of Indonesian origin, said Dellamotte.
The letter F in the tool stands for a vulgar term that appears to have been adopted to help market the tool to cybercriminals.
FBot has three functions dedicated to AWS account attacks.
The first is an AWS API Key Generator, handled by function aws generator, which generates a random AWS access key ID by appending 16 randomly selected alphabetic characters to the standard AKIA prefix.
The second AWS feature is a Mass AWS Checker, handled by function aws checker.
This function checks for AWS Simple Email Service email configuration details, including the maximum send quota and rate, as well as how many messages have been sent in the past 24 hours, likely to maximize spamming efforts against the targeted account.
Unlike other cloud attack tools such as AlienFox, FBot does not delete the compromised account the attacker used to gain access.
The third and final AWS feature is an AWS EC2 Checker, with the description Get EC2 VCPU Limit, which is handled by function ec checker.
This function reads a list of AWS identities from a text file in the format of AccessKey|SecretKey|Region.
The script uses these values to check the targeted account's EC2 service quotas.
The FBot menu highlights that this can be used to check vCPU details.
The query results describe the account's EC2 configurations and capabilities and then iterates through a list of specified AWS regions, runs the query again for each region and logs the result to a text file.
In terms of functionality and design, FBot is similar to an existing Legion infostealer tool, but is based on a different codebase that was clearly created by professional developers, said Delamotte.
It is likely that whoever built FBot adapted some of the code used to create Legion, she added.
There is no mechanism for identifying whether FBot has been used to compromise a cloud service, but its discovery should serve as a reminder to limit the scope of the cloud services that any single credential should be allowed to access, said Delamotte.
Hopefully, there might be a repository created one day that keeps track of the tools being used by cybercriminals in the hope of making it simpler to identify tactics and techniques.
In the meantime, there is no substitute for basic cloud security hygiene in an era where the tools being created by cybercriminals are only going to become increasingly sophisticated.


This Cyber News was published on securityboulevard.com. Publication date: Thu, 11 Jan 2024 15:43:15 +0000


Cyber News related to SentinelLabs Details Discovery of FBot Tool for Compromising Cloud Services

SentinelLabs Details Discovery of FBot Tool for Compromising Cloud Services - SentinelLabs today published a report identifying a Python-based tool that cybercriminals are using to compromise cloud computing and software-as-a-service platforms. Alex Delamotte, senior threat researcher at SentinelLabs, said FBot is used to take ...
10 months ago Securityboulevard.com
Python-Based Tool FBot Disrupts Cloud Security - Security researchers have shed light on a new Python-based hacking tool, FBot, showcasing distinct features from other cloud malware families. Discovered by the SentinelLabs team, FBot targets web servers, cloud services and Software-as-a-Service ...
10 months ago Infosecurity-magazine.com
Multi-Cloud vs. Hybrid Cloud: The Main Difference - The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and they're sometimes baffled by the distinction between multi-cloud and hybrid cloud. Although the public cloud infrastructure and public cloud ...
11 months ago Techtarget.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 month ago Aws.amazon.com
What is a Cloud Architect and How Do You Become One? - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy. This includes cloud adoption plans, cloud application design, and cloud management and monitoring. Cloud architects oversee application ...
8 months ago Techtarget.com
2023 Cloud Security Report - Security concerns remain a critical barrier to cloud adoption, showing little signs of improvement in the perception of cloud security professionals. Cloud adoption is further inhibited by a number of related challenges that prevent the faster and ...
11 months ago Cybersecurity-insiders.com
The 10 Best Cloud Security Certifications for IT Pros in 2024 - Many professionals seeking a career in cloud security turn to certifications to advance their learning and prove.... their knowledge to potential employers. The number of cloud security certifications has increased in recent years making it difficult ...
10 months ago Techtarget.com
Researchers Flag FBot Hacking Tool Hijacking Cloud, Payment Services - Malware hunters at SentinelOne on Thursday flagged a newly discovered Python-based hacking tool being used by cybercriminals to hijack cloud platforms and payment services. The tool, called FBot, is capable of credential harvesting for spamming ...
10 months ago Securityweek.com
Cloud Security: Stats and Strategies - An interesting aspect in O'Reilly's latest Cloud Adoption report based on a global survey conducted is that 90% of the responders are using the cloud to support their business. One of the key takeaways from the State of the Cloud report from Flexera ...
10 months ago Feeds.dzone.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
9 months ago Esecurityplanet.com
Top Cloud Security Issues: Threats, Risks, Challenges & Solutions - Cloud security issues refer to the threats, risks, and challenges in the cloud environment. To combat these cloud security issues, develop a robust cloud security strategy that addresses all three to provide comprehensive protection. Cloud security ...
5 months ago Esecurityplanet.com
Predator AI ChatGPT Integration Poses Risk to Cloud Services - Cybersecurity researchers at SentinelLabs have uncovered a new Python-based infostealer and hack tool named "Predator AI.". The malicious tool is specifically designed to target cloud services and integrates artificial intelligence technology, ...
11 months ago Infosecurity-magazine.com
4 types of cloud security tools organizations need in 2024 - By now, organizations know which on-premises security tools they need, but when it comes to securing the cloud, they don't always understand which cloud security tools to implement. While many traditional on-premises tools and controls work in the ...
7 months ago Techtarget.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
5 months ago Esecurityplanet.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
Benefits and challenges of managed cloud security services - Too many organizations lack the in-house cloud security expertise and resources needed to protect cloud assets effectively. One option to address these challenges is managed cloud security. Outsourcing cloud security to a third party not only helps ...
9 months ago Techtarget.com
What is a cloud application? - A cloud application, or cloud app, is a software program where cloud-based and local components work together. Cloud application servers are typically located in a remote data center operated by a third-party cloud services infrastructure provider. ...
8 months ago Techtarget.com
Securing Student Data in Cloud Services - In today's educational landscape, securing student data in cloud services is of utmost importance. One key aspect of securing student data in cloud services is ensuring proper data encryption. This article explores the various challenges and best ...
10 months ago Securityzap.com
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization - The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments - a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. As organizations increase ...
6 months ago Crowdstrike.com
What Is Cloud Workload Security? Ultimate Guide - Cloud workload security, or cloud workload protection, refers to the tools and policies used to protect apps, services, and resources that run on cloud infrastructure. Your organization can manage cloud workload security through coordination across ...
4 months ago Esecurityplanet.com
Comprehensive Cloud Monitoring Platforms: Ensuring - Platforms for comprehensive cloud monitoring come into play in this situation. In this article, we will explore the significance of comprehensive cloud monitoring platforms and delve into some leading solutions available in the market today. ...
11 months ago Feeds.dzone.com
What is cloud load balancing? - Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources. Cloud load balancing helps enterprises achieve ...
8 months ago Techtarget.com
7 Considerations for Multi-Cluster Kubernetes - A hybrid cloud is a cloud computing environment that combines public and private clouds, allowing organizations to utilize the benefits of both. In a hybrid cloud, an organization can store and process critical data and applications in its private ...
10 months ago Feeds.dzone.com
Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security - We're thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes ...
4 months ago Crowdstrike.com
Managing the Requirements of a MultiCloud System - The use of digital technology has advanced to include cloud computing in the delivery of services, cost reduction, increased agility, and improved security. The emergence of various cloud solutions has led organizations to move their assets from ...
1 year ago Blog.isc2.org

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)