Cloud ransomware assaults have grow to be a typical strategy from malicious actors to compromise the IT programs of their targets, in accordance with SentinelOne.
Attackers are more and more leverage cloud suppliers’ companies to immediately compromise their victims or exfiltrate knowledge, in accordance with a brand new report by SentinelLabs.
On the one hand, they aim cloud-based storage companies to compromise and extort victims. On the opposite, they use cloud companies to exfiltrate the info they intend to ransom.
Alex Delamotte, a risk researcher at SentinelLabs, the cybersecurity supplier’s analysis department, printed The State of Cloud Ransomware in 2024 on November 14.
Amazon’s Easy Storage Service and Microsoft Azure Blob Storage Focused
Cloud companies present a bonus over endpoint and net server-based companies by having a smaller assault floor.
Nevertheless, the ever present use of cloud companies makes them enticing to attackers, who’ve developed new approaches to compromise them.
Regardless of being designed to securely retailer, handle, and retrieve massive volumes of unstructured knowledge at scale, cloud-based storage companies, such because the Amazon Net Companies (AWS) Easy Storage Service (S3) or Microsoft Azure Blob Storage, have grow to be prime targets.
S3 buckets are probably the most referenced targets of malicious exercise.
“The attacker takes benefit of a very permissive S3 bucket the place they’ve write-level entry, which is usually the results of misconfiguration or accessed within the focused surroundings by means of different means, equivalent to legitimate credentials,” Delamotte defined.
One method exploits knowledge retention measures applied by cloud service suppliers (CSPs).
For instance, AWS Key Administration Service (KMS) defines a seven-day window between a key delete request and its everlasting deletion, offering customers with time to detect and rectify a cryptographic ransom assault towards S3 situations.
Attackers are in a position to schedule a KMS key for deletion and be topic to the seven-day window earlier than the bottom line is completely deleted within the sufferer’s surroundings.
They will leverage this with a purpose to threaten victims with knowledge deletion.
One other method targets Amazon Elastic Block Retailer (EBS) volumes, that are extremely accessible, sturdy block storage units you could connect to Amazon EC2 (Elastic Compute Cloud) situations, by means of an analogous strategy.
Usually, the attacker creates a brand new KMS key, creates a snapshot of the EBS volumes, encrypts the volumes after which deletes the unique, unencrypted quantity.
“This system continues to be topic to the seven-day key deletion coverage, which offers a window of alternative for the shopper to remediate earlier than the bottom line is deleted ceaselessly,” Delamotte added.
Leveraging Cloud Companies to Exfiltrate Knowledge
Moreover, a number of safety suppliers have noticed risk actors utilizing cloud companies to exfiltrate the info they intend to ransom.
“In September 2024, modePUSH reported that the BianLian and Rhysida ransomware teams at the moment are utilizing Azure Storage Explorer to exfiltrate knowledge from sufferer environments as a substitute of traditionally in style instruments like MEGAsync and rclone,” reads the SentinelLabs report.
“In October 2024, Pattern Micro reported {that a} ransomware actor mimicking the infamous LockBit ransomware group used samples that leverage Amazon’s S3 storage to exfiltrate knowledge stolen from the focused Home windows or macOS programs.”
SentinelOne’s Mitigation Suggestions
To mitigate cloud-focused ransomware assaults, SentinelOne recommends two important safety measures:
- Use a cloud safety posture administration (CSPM) resolution to find and assess cloud environments and alert of points equivalent to misconfiguration and overly permissive storage buckets
- All the time implement good id administration practices, equivalent to requiring multifactor authentication (MFA) on all admin accounts and deploy runtime safety towards all cloud workloads and sources
Learn now: Prime 10 Infrastructure Components of Ransomware-as-a-Service