Cybercriminals Are Using Legit Cloud Monitoring Tools As Backdoor
A cybercrime group that has formerly struck Docker and Kubernetes cloud environments has progressed to repurpose genuine cloud checking equipment as a backdoor to have out malicious attacks, according to new analysis.
“To our understanding, this is the first time attackers have been caught utilizing legitimate 3rd bash software package to concentrate on cloud infrastructure,” Israeli cybersecurity business Intezer said