UPDATED 00:24 EDT / NOVEMBER 03 2016

NEWS

Cyber-attackers probe public clouds for specific weaknesses

Hackers are getting smarter, picking away at different public cloud’s architecture in an effort to find unique vulnerabilities in infrastructure hosted by companies like Amazon Web Services and Microsoft Azure.

The fruits of such labor are clearly evident in new research from security firm Rapid7 Inc. It shows, for example, that almost a quarter of customer nodes deployed on IBM Corp.’s SoftLayer cloud expose database services like MySQL and SQL Server directly to the Internet, putting both the organization and its customers at risk. In addition, the research found the vast majority of customer devices on Digital Ocean’s and Google’s clouds expose shell services using Internet protocols such as SSH and Telnet. The latter of those was critical in last month’s DDoS attacks that took out Dyn Inc., the managed domain name provider.

Companies that use public clouds are also probed by hackers on a frequent basis. One popular tactic is to use common vulnerabilities such as ShellShock to compromise remote desktops sessions, the report found.

The report is the culmination of a classic “honeytrap” project initiated by Rapid7, which is designed to identify what attackers, researchers and organizations are doing in, across and against cloud environments. Rapid7 carried out its research by deploying dummy machines which are designed to observe how hackers carry out their attacks. Rapid7 previously used these “honeypot devices” to develop a Big Data-based security approach under its Project Sonar, and is now working with AWS and Microsoft under the Project Heisenberg initiative to try to profile attacks against public cloud customers.

Project Sonar scanned millions of IPv4 HTTPS web servers for details about digital certificates used, in order to detect whether any of them were compromised. Project Heisenberg uses the same approach in thepublic cloud.

One of the main questions Project Heisenberg was seeking to answer was whether or not attackers employ a “scattergun” approach or tailor their attack methods for each public cloud and customer. The evidence overwhelmingly points in favor of the latter, showing that attackers are refining their attack techniques for customer profiles linked to specific cloud providers.

A second aspect of the research looked at whether AWS, Azure, Digital Ocean, Google, Rackspace and SoftLayer cloud users had introduced new security risks by exposing services to the web, for example Windows, databases, email services, shell and web services.

“While most cloud user populations rely on these services for web hosting, the kinds of services exposed by each cloud provider’s user populations are varied according to the provider,” Rapid7 said. “These differences are being tested and exploited today by a range of adversaries who are clearly aware of these differences.”

Full details of Rapid7’s pubic cloud security research can be found here.

Photo Credit: Sea Moon Flickr via Compfight cc

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU