ALL >> Computers >> View Article
Scammers Use Cloud Services To Spread Malware

Major organizations operate from several centers in various countries. While some centers concentrate on core activities, others focus on back office services. These centers function at different time zones, which create the need for greater collaboration, accessibility of individuals and centralization of information resources. This phenomenon combined with security issues have resulted in shift towards cloud computing. Organizations use cloud-based services for improving coordination between different teams, ensuring smooth work flow, easier availability of required data and resolving performance issues. However, cybercriminals also benefit from advancements in technology and devise new ways to perpetrate crime.
Recently, security researchers at Kaspersky have identified active exploitation of Amazon Simple Storage Service (S3) by gangs indulging in Internet crime. They are reportedly using the cloud computing services for maintaining and running SpyEye activities. According to researches, cybercriminals are possibly leveraging stolen identities and information to create web services account required to abuse the S3 ...
... services. It is evident that even paid cloud computing services are no hurdle for the offenders to carry out malicious activities. By leveraging technological innovations, cybercriminals are increasing the effectiveness and reach of the already sophisticated information stealing malware.
SpyEye is a widely used malware to steal login credentials by capturing the key strokes of the user. Malware writers constantly endeavor to create more sophisticated variants of the malware. Cyber security professionals must acquaint themselves of latest threats, evolving modus operandi of cybercriminals, and security measures through online university degree and security certification programs.
Some reports earlier suggested use of the cloud services for attacks on Sony Corporation. The Russian computer security firm had earlier identified the use of financial information stealing malware through cloud-based services to steal data from banks, login credentials of messenger services, computer details, and digital certificates. The use of cloud services for dissemination of malware indicates increased sophistication in the way criminals achieve their ends.
Organizations offering cloud services must regularly evaluate the security threats in the cloud environment. In the same way, organizations using or intending to move to cloud computing must evaluate the security threats and implement measures required to ensure secured use of such services. Professionals qualified in masters of security science may help organizations in timely identification of threats, initiating of mitigating measures and ensuring smooth transition to new services.
Cybercriminal are bound to leverage advancements in technology to perpetrate crime. While move towards latest technologies is crucial to improve performance, interoperability and other demands of the dynamic work environment, administrators must not compromise on the security of personal and business information in the process. As such, developers and security firms face an uphill task of incorporating security checks in new products and services. They must regularly for security threats and incorporate updates to improve convenience and reliability of services for the end-users.
Counter crime agencies, developers and security firms may help in creating awareness on security threats to e-flyers, blogs and security tips in advertisements. Netizens may leverage online degree programs to gain insights on security fundamentals and improve their cyber security practices.
Add Comment
Computers Articles
1. Employee Attendance System | 1 Sgd Mobile AttendanceAuthor: knani
2. Employee Mobile App For Time Attendance In Singapore
Author: knani
3. Malaysia Website Design – Rm499 For Unlimited Pages
Author: chinni rishi
4. Budget Website Design Malaysia | Rm499 & Unlimited Pages
Author: chinni rishi
5. Streamlined Attendance Tracking | Free Payroll
Author: kayakakula rishi
6. Singapore Employee App | Free Payroll | Just 1sgd
Author: kayakakula rishi
7. Biometric Fingerprint Attendance System | Free Payroll | Starting At 1sgd/mo
Author: kayakakula rishi
8. Top Web Design Agency Sg | 499sgd Unlimited Pages
Author: kayakakula rishi
9. Best Cms Web Design | Sgd 499 Nett Singapore
Author: kayakakula rishi
10. Your Web Project | Singapore | 499sgd Unlimited Pages
Author: kayakakula parvathi
11. Create Your Web Solution | Singapore | 499sgd Unlimited
Author: kayakakula parvathi
12. Tailored Virtual Security Guard Sg Plans From 30sgd
Author: chinni parvathi
13. Confined Space Management Best Practices | Free Payroll
Author: chinni parvathi
14. Zuckerberg’s Bold Ai Initiative: 5 Big Moves Unveiled
Author: Impaakt Magazine
15. Trending Technologies In Frontend Development
Author: davidjohansen