Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

12/3/2020
02:00 PM
Or Azarzar
Or Azarzar
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

Cloud Security Threats for 2021

Most of these issues can be remediated, but many users and administrators don't find out about them until it's too late.

Security in the cloud era is a priority — but the cloud has provided bad actors with a greater set of targets than ever, as well as with new tools to conduct attacks. Those attacks are based on launch points ranging from the mundane, such as forgotten or compromised credentials, to new ones using data science tools such as AWS Glue and Sage Maker and sophisticated attacks using powerful tools like Kubernetes. Here are some of the up-and-coming attacks we can expect to see more of as we move into 2021.

Related Content:

CSA Moves to Redefine Cloud-Based Intelligence

The Changing Face of Threat Intelligence

New on The Edge: We Secured the Election. Now How Do We Secure Trust in Results?

Persistency Attacks
Cloud architecture allows for full flexibility when it comes to creating new instances and running virtual machines that can match any hardware or software environment desired. But that flexibility, if not properly secured, lets bad actors launch attacks — and persist in doing so as they maintain control over the initial assault.

Cloud services like Amazon Web Services make it easy for developers to build an environment in a gradual or off-and-on manner. AWS, for example, allows developers to automatically execute a script with every restart of an Amazon EC2 instance (known as User Data) — meaning that if hackers managed to exploit an instance using a poisoned shell script that might have been passed into the cloud instance, they will be able to continually and persistently exploit their connection to a server.

From that perch, hackers would be able to laterally move within the server, either stealing data or acquiring privileges that will enable them to further exploit the organization's assets. Of course, administrators can shut down this option and require developers to log in each time they return to the environment — but they must be proactive about it. In essence, the flexibility of AWS is its weakness here; along with the plethora of configuration options, there are more opportunities for service misconfigurations, giving hackers more opportunities for mischief.

Data Science Tool Attacks
Notebooks have proven to be indispensable for data scientists, enabling them to quickly integrate and analyze data. Tools such AWS Sage Maker make that process even more efficient, enabling data scientists to build, train, and deploy machine learning models. But because these are relatively new tools utilized by a cohort that may not be as security-conscious as it should be, bad actors may be able to take advantage of them. Tools such as Sage Maker are, like other Amazon products, very flexible, with many options.

Research shows that bad actors could take advantage of some of these options to escalate their privileges, even giving themselves top administrator privileges with the user none the wiser. This attack path could enable a bad actor to open the terminal function on a cloud instance and exfiltrate credential data — bypassing Amazon GuardDuty — which could be used to gain access to advanced roles and rights. Similarly, bad actors can take advantage of open source projects like CloudGoat, utilizing AWS Glue, CodeBuild, and S3 as well as unused groups and roles to carry out privilege escalation. Here, too, administrators and data scientists need to be familiar with the structure of the systems they're working with in order to protect themselves, closing up gaps that hackers take advantage of.

Bots Could Infect Cloud Legacy Assets
Bots are everywhere, including the cloud; a report by security firm GlobalDots shows that over 80% of "bad bots" — the ones that steal data, scrape content, distribute spam, run distributed denial-of-service attacks, etc. — operate from cloud-based data centers. While many bots export their poison to other sites — using the servers they ensconced themselves on to attack other servers and users — they can just as easily be used to enslave a cloud infrastructure to perform tasks for their owners. Among the more popular of those tasks is cryptomining — to the extent that it is one of the biggest cyberthreats around, according to studies.

If losing resources and assets weren't enough, new variations of cryptomining malware now have the ability to steal AWS credentials, according to researchers. The exploit is wrapped in cryptomining malware and seeks out the unencrypted AWS CLI file, from which the worm extracts credentials data. The solution is to limit access to that data — but administrators need to actively do that.

More Kubernetes Compromises Coming
The same outfit responsible for the AWS credential thefts mentioned above, called TeamTNT, has developed methods to abuse open source visualization and monitoring tool Weave Scope, taking advantage of a common misconfiguration issue. Using default open access granted via port 4040, the hackers install Weave Scope, using it as a backdoor to monitor systems, utilize resources, install applications, open, start, or stop shells in containers — basically anything they want.

Right now, hackers are mostly using these methods to install cryptomining malware, but there's nothing to stop them from enslaving cloud systems for other purposes. And attack vectors keep changing — and growing. As Kubernetes continues to evolve and add new features and capabilities, you can be sure that bad actors are close behind, penetration-testing each new aspect of the system and looking for advantages — holes and misconfigurations that are unlikely to be filled in by users because they don't know how to, don't understand them, or aren't even aware of them.

Preemptive Defense
Cloud attacks naturally grow as more companies open more cloud installations. With public cloud spending by companies expected to more than double by 2023 over 2019's allocations, we can expect to see more of these — and other — kinds of attacks as hackers continually seek to seize on the "weakest links" they can find.

The pity is that most of these issues, and others still to appear, can be remediated, but many users and administrators don't find out about them until it's too late. At that point, they become "victims," with their stories written up on blogs of the security companies that try to solve the problem — after the attack. The trick is to discover and remediate these issues before they become a problem, by discovering the "hole" or misconfiguration that gives the hackers the opening they need. As cloud usage grows in 2021, awareness of configuration issues — and ways to resolve them — needs to grow in tandem.

Or Azarzar is the Co-Founder and CTO of Lightspin, leading the company's development, security research, and engineering operations. As an innovative security product builder, he is a thought leader in the area of defensive and offensive product research and development. ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-25329
PUBLISHED: 2021-03-01
The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previousl...
CVE-2021-25122
PUBLISHED: 2021-03-01
When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request...
CVE-2021-27225
PUBLISHED: 2021-03-01
In Dataiku DSS before 8.0.6, insufficient access control in the Jupyter notebooks integration allows users (who have coding permissions) to read and overwrite notebooks in projects that they are not authorized to access.
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.