Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • Networking

    Cyber-Attackers Taking Aim at Cloud and Virtualized Environments

    Written by

    Fahmida Y. Rashid
    Published June 7, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      NEW YORK-Cyber-criminals are simultaneously taking advantage of the cloud’s benefits to launch attacks as well as targeting organizations’ cloud services, security experts said.

      As organizations increasingly virtualize their data centers and move their applications to the cloud, attackers are beginning to think, “Let’s attack here,” Allen Vance, director of product management of the data and applications security group at Dell SecureWorks, told attendees at Cloud Expo during a session on cloud security on June 6. Organizations have to put in measures to handle threats to their virtualized environments when considering a cloud deployment because the environment amplifies the risks, Vance said. Cloud Expo is running from June 6 to June 9 here.

      “We are in the middle of a war,” Terry Woloszyn, CTO of PerspecSys, told attendees in a different session on cloud security. He compared the current security climate to an “arms race” as cyber-attackers are continuously developing new attack vectors and modifying existing threats, leaving vendors and businesses to play catch-up.

      Nowhere is this more evident than the recent game of whack-a-mole Apple has been playing with malware developers behind the fake MacDefender antivirus scam and its many variants over the past few weeks.

      A new MacDefender variant appeared within 24 hours after Apple released a security update on June 1 that included the malware definition in the Mac OS X File Quarantine list. After Apple updated definition files to cover the new variant on June 2, yet another one popped up that bypassed the quarantine hours later.

      Vulnerabilities reported in virtualized technologies have “nearly doubled” between 2008 and 2010, according to data compiled by Dell SecureWorks Threat Intelligence and Intrusion, Vance said. Dell SecureWorks found that security “events” detecting attacks against virtual environments increased by more than 500 percent over the same period.

      Cyber-attackers can try to steal credentials related to cloud providers, such as the organization’s username and password for Amazon Web Services and the certification and private key used, Dell’s Vance said. Malware is increasingly sophisticated enough to exploit vulnerabilities and use hyper-escalation to compromise cloud platforms, Vance said.

      Hyper-escalation refers to what happens when malware exploits a vulnerability in the hypervisor to break out of the virtual machine and gain root privileges on the actual server hardware. This would give attackers complete control over all the other virtual machines running on that machine, a serious threat in a multi-tenancy environment. When organizations are sharing network infrastructure, databases, data storage and computing resources, risks are aggregated, Vance said.

      It’s not just “script kiddies” that are breaking into networks and writing malicious code, according to Woloszyn. Attacks are originating from “sophisticated nation-states with cyber-commands” as well as from organized crime. Cyber-attackers are using “strategic multi-pronged” attacks, such as compromising RSA Security first and then using the stolen data to break into defense contractor Lockheed Martin, according to Woloszyn.

      Stuxnet was a “cyber cruise missile,” which was “stunning” in the way it targeted highly specialized systems, according to Woloszyn. “Who’s to say the next targeted attack won’t be against the cloud?” Woloszyn asked attendees.

      Another threat against cloud services is in the APIs used to connect applications and services, according to Dell’s Vance. There are “thousands” of Web-based APIs, and 10 to 15 new ones are being created each day. If they are not built or implemented correctly, organizations are vulnerable to man-in-the-middle campaigns, identity spoofing, accidental leakage of confidential data and even denial-of-service attacks.

      In the event of a breach, forensic analysis is also more difficult in the cloud, Dell’s Vance said. The fact that the environment is maintained by a third party may actually slow down initial incident response as well as the time required to remediate vulnerabilities. One reason for the delay may be because the cloud provider’s first priority is often in making sure other customers are unaffected.

      Both Vance and Woloszyn noted that cloud environments are vulnerable to malicious insiders, who may decide to abuse their privileges.

      Vance emphasized the importance of organizations monitoring cloud logs. Just because they are giving up operational control doesn’t mean IT departments can’t monitor the host, the guest virtual machines and other security services. Woloszyn said organizations should also consider implementing a zero-trust environment in the cloud so that only the exact information the user needs is revealed and nothing else. Layers of access, where some people have higher levels of trust than others and only anomalies are tracked, mean attackers just have to figure out a way to escalate privileges to gain unfettered access to data.

      Traditional security techniques have limited effect in the cloud, Vance said, noting that organizations need to look at “old problems” and consider them in a new context.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×