Powered by MOMENTUM MEDIA
cyber daily logo

Breaking news and updates daily. Subscribe to our Newsletter

Breaking news and updates daily. Subscribe to our Newsletter X facebook linkedin Instagram Instagram

Unsecure configurations heighten risk for SMEs as Log4j-based malware attacks persist

Lacework released the third volume of its Cloud Threat Report, a semi-annual accounting of the ongoing cyber security threats impacting the cloud. Conducted over a six-month period, the Cloud Threat Report found threat actors are broadening the scope of their efforts to gain illicit access to cloud data and resources.

user iconReporter
Thu, 31 Mar 2022
Unsecure configurations heighten risk for SMEs as Log4j-based malware attacks persist
expand image

In addition to increased targeting of cloud platforms beyond AWS, Microsoft Azure and Google Cloud, malicious actors are rapidly adapting new attacks to target organisations in the cloud. As world governments issue warnings over the increasing cyber crime threat, the report’s findings highlight some of the most common threats businesses should protect against.

Small businesses, in particular, are at risk from cloud access brokers, who sell access to cloud accounts online. According to the report, 78 per cent of SMBs observed by the Lacework Labs team had compliance violations within their cloud infrastructure, opening the door for attackers to gain initial access, escalate privileges and impact protected data.

Threat actors continue to show sophistication as they create and adapt new attacks to compromise the cloud, according to James Condon, director of research at Lacework.

“Organisations moving more data to cloud infrastructure need to be just as nimble, employing security best practices and modern tools with continuous monitoring to stay ahead of cyber criminals and keep critical information safe,” Condon said.

This third instalment of the Cloud Threat Report highlights four key areas of cloud security: cloud security posture, vulnerabilities and software supply chain, runtime threats and Linux malware, and proactive defence and intelligence. Based on anonymised data across the Lacework platform from September 2021-February 2022, the report found:

Cloud security posture mistakes are open doors for threat actors

Seventy-two per cent of cloud environments monitored had insecure configurations, providing a warm welcome for attackers to gain initial access, establish persistence, escalate privileges and impact protected data across clouds. The most common risks were found in the AWS services IAM, S3 and EC2, which were also the most popular services for attackers to abuse.

Every cloud is a target, not just the big 3

Despite being one of the largest cloud services providers, AWS accounts make up only 16 per cent of overall hosting of illicit access for sale, while lesser-known companies like HostGator and Bluehost make up half. Though corporate accounts are being offered for as low as US$300 and upwards of US$30,000, the average price of a compromised AWS account is roughly US$40. This high volume of lower priced inventory indicates that attackers may be taking advantage of the increased compliance violations in SMB organisations and a lack of focus on securing consumer accounts.

Log4j remains a significant threat, and malware is adapting quickly

Thirty-one percent of malware infections observed by the Labs team use Log4j as the initial infection vector. What’s more, Muhstick, the malware family most commonly observed in the wild, can incorporate vulnerabilities like Log4j into their operations within 48 hours, reinforcing how quickly threat actors will respond to take advantage of vulnerability disclosures.

The Lacework Labs team also examined issues around compliance, exposed Docker APIs and malicious containers, and additional vulnerabilities within the software supply chain. Based on the findings of this report, Lacework Labs recommends that defenders evaluate security infrastructure against industry best practices and implement proactive defence and intelligence tools with active vulnerability monitoring.

[Related: FEDERAL BUDGET: Industry reacts to $9.9bn REDSPICE project]

cd intro podcast

Introducing Cyber Daily, the new name for Cyber Security Connect

Click here to learn all about it
newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.