123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Scammers Use Cloud Services To Spread Malware

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Major organizations operate from several centers in various countries. While some centers concentrate on core activities, others focus on back office services. These centers function at different time zones, which create the need for greater collaboration, accessibility of individuals and centralization of information resources. This phenomenon combined with security issues have resulted in shift towards cloud computing. Organizations use cloud-based services for improving coordination between different teams, ensuring smooth work flow, easier availability of required data and resolving performance issues. However, cybercriminals also benefit from advancements in technology and devise new ways to perpetrate crime.

Recently, security researchers at Kaspersky have identified active exploitation of Amazon Simple Storage Service (S3) by gangs indulging in Internet crime. They are reportedly using the cloud computing services for maintaining and running SpyEye activities. According to researches, cybercriminals are possibly leveraging stolen identities and information to create web services account required to abuse the S3 ...
... services. It is evident that even paid cloud computing services are no hurdle for the offenders to carry out malicious activities. By leveraging technological innovations, cybercriminals are increasing the effectiveness and reach of the already sophisticated information stealing malware.

SpyEye is a widely used malware to steal login credentials by capturing the key strokes of the user. Malware writers constantly endeavor to create more sophisticated variants of the malware. Cyber security professionals must acquaint themselves of latest threats, evolving modus operandi of cybercriminals, and security measures through online university degree and security certification programs.

Some reports earlier suggested use of the cloud services for attacks on Sony Corporation. The Russian computer security firm had earlier identified the use of financial information stealing malware through cloud-based services to steal data from banks, login credentials of messenger services, computer details, and digital certificates. The use of cloud services for dissemination of malware indicates increased sophistication in the way criminals achieve their ends.

Organizations offering cloud services must regularly evaluate the security threats in the cloud environment. In the same way, organizations using or intending to move to cloud computing must evaluate the security threats and implement measures required to ensure secured use of such services. Professionals qualified in masters of security science may help organizations in timely identification of threats, initiating of mitigating measures and ensuring smooth transition to new services.

Cybercriminal are bound to leverage advancements in technology to perpetrate crime. While move towards latest technologies is crucial to improve performance, interoperability and other demands of the dynamic work environment, administrators must not compromise on the security of personal and business information in the process. As such, developers and security firms face an uphill task of incorporating security checks in new products and services. They must regularly for security threats and incorporate updates to improve convenience and reliability of services for the end-users.

Counter crime agencies, developers and security firms may help in creating awareness on security threats to e-flyers, blogs and security tips in advertisements. Netizens may leverage online degree programs to gain insights on security fundamentals and improve their cyber security practices.

Total Views: 262Word Count: 500See All articles From Author

Add Comment

Computers Articles

1. Access Review Fatigue Is Not A People Problem. It Is A Design Problem
Author: Tushar Pansare

2. Which Is The Best Data Recovery Service Provider In Delhi?
Author: Stellar Data Recovery India

3. Microsoft Access 2024 Vs. Microsoft Excel 2024: Which Tool Should You Use?
Author: davudobuya55

4. When Identity Governance Becomes An Audit Ritual
Author: Mansoor Alam

5. Power Virtual Agents To Microsoft Copilot studio
Author: brainbell10

6. Dream11 Clone App Guide For The Upcoming Ipl Season
Author: Jorden James

7. Computer Network Tutorial: Step-by-step Guide To Networking Fundamentals
Author: Tech Point

8. Ai Video Creation Services In Chandigarh | Growchip Ai Technologies
Author: AI Video Creation Services

9. Why Online Privacy Matters More Than Ever In 2026
Author: Faraz

10. Spark Matrix™: Data Integration Tools
Author: Umangp

11. D365 Consultant Business Success
Author: brainbell10

12. Medical High-end Touch Monitor From Fortec Integrated
Author: FORTEC Integrated GmbH

13. Why Rugtek Ls3002 Is Best For Retail Barcode Scanning
Author: prime pos

14. Spark Matrix™: Conversational Commerce
Author: Umangp

15. Multi-path Cellular Aggregation | Cellular Sd-wan India | Smoad
Author: SMOD

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: