Cybercriminals Are Using Legit Cloud Monitoring Tools As Backdoor

cloud-servers

A cybercrime group that has formerly struck Docker and Kubernetes cloud environments has progressed to repurpose genuine cloud checking equipment as a backdoor to have out malicious attacks, according to new analysis.

“To our understanding, this is the first time attackers have been caught utilizing legitimate 3rd bash software package to concentrate on cloud infrastructure,” Israeli cybersecurity business Intezer said

Supply backlink

Examine a lot more on Hacking Information

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *