Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Apple’s original cloud photo sync service shuts down this summer

    May 30, 2023

    Cloud-based IT operations are on the rise

    May 26, 2023

    Twitter Is a Far-Right Social Network

    May 25, 2023
    Facebook Twitter Instagram
    Your Infotech
    • Data

      Are Your APIs Leaking Sensitive Data?

      May 23, 2023

      6 barriers to becoming a data-driven company

      May 18, 2023

      How to explain data meshes, fabrics, and clouds

      May 16, 2023

      Crypto Price Today: Bitcoin holds above $27,600, focus on US CPI data

      May 12, 2023

      How To Delete Your Data From ChatGPT

      May 10, 2023
    • Cloud

      Apple’s original cloud photo sync service shuts down this summer

      May 30, 2023

      Cloud-based IT operations are on the rise

      May 26, 2023

      Google Cloud upgrades with next-gen accelerator that embiggens its VMs

      May 24, 2023

      Dark cloud over ChatGPT revolution: the cost

      May 22, 2023

      Google Cloud launches A.I.-powered tools to accelerate drug discovery, precision medicine

      May 19, 2023
    • Networking

      Twitter Is a Far-Right Social Network

      May 25, 2023

      Meta Platforms scoops up AI networking chip team from Graphcore

      May 15, 2023

      What Is Bluesky? The Twitter Alternative With Promising Networking Technology

      April 24, 2023

      Enterprise networking sees age of SASE and network as a service

      April 19, 2023

      Computer Networks: Myths, Missteps, and Mysteries – Radia Perlman at QCon London

      April 11, 2023
    • Virtualization

      Imagination and Telechips drive automotive display diversity with hardware virtualization

      March 16, 2023

      Device virtualization is key to IoT adoption

      March 3, 2023

      Discover how virtualization can transform your business with this online training

      February 7, 2023

      Server Virtualization Software Market Next Big Thing | Major Giants IBM, Oracle, Microsoft

      February 2, 2023

      Global Data Virtualization Market Report 2022: Featuring Oracle, IBM, Cisco, Salesforce, Workday, Alteryx, Domo, Ceros, Cluvio & Qliktech International

      January 26, 2023
    • IT Infrastructure

      TCS+ | The need for speed: Braintree’s Heath Huxtable on modern IT infrastructure

      March 13, 2023

      The race to net zero: Six ways to slash IT infrastructure emissions

      March 10, 2023

      Vertiv and TechAccess partner to boost African IT infrastructure solutions

      February 28, 2023

      It Infrastructure Market Size 2023 Research Report with Technological Factors and Forecast till 2025

      February 21, 2023

      Geojit to build 1.25 lakh sq ft IT infrastructure in Infopark

      February 14, 2023
    Your Infotech
    Home»Cloud»Cryptojacking, DDoS attacks increase in container-based cloud systems
    Cloud

    Cryptojacking, DDoS attacks increase in container-based cloud systems

    yourinfotechBy yourinfotechOctober 8, 2022Updated:November 10, 2022No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cryptojacking is the most common form of attack against container-based systems running in the cloud, while geopolitical motivations—mainly related to Russia’s war against Ukraine—factored into a fourfold increase in DDoS (distributed denial-of-service) attacks this year, according to a new report from cybersecurity company Sysdig.

    As containers are increasingly used in cloud-based systems, they have also become an important attack vector for supply chain attacks, according to the 2022 Sysdig Cloud Native Threat Report, released Wednesday and based on findings from the Sysdig Threat Research Team (Sysdig TRT).

    “Because container images are designed to be portable, it is very easy for one developer to share a container with another individual,” according to the report. “There are multiple open source projects available providing the source code to deploy a container registry or free access container registries for developers to share container images.”

    Public container repositories contain malicious images

    Public container image repositories such as Docker Hub are increasingly being filled with malicious images that contain cryptominers, backdoors and other threat vectors disguised as legitimate software applications, noted Sysdig, which specializes in container and cloud security products.

    Cryptojacking—the unauthorized use of computing infrastructure to mine cryptocurrency—remains the primary motivation for opportunistic attackers, exploiting critical vulnerabilities and weak system configurations, the report said.

    “In the Docker Hub analysis total unique malicious images in the reported data set was 1,777. Of those, 608 or 34% contained miners,” said Michael Clark, director of threat research at Sysdig.

    The high prevalence of cryptojacking activity is attributable to the low risk and high reward for the perpetrators. Cryptojackers make $1 of profit for every $53 in compute resources the victim is billed, according to Sysdig. The company based this calculation on an analysis of activities conducted by a threat actor called TeamTNT, and the cost of cryptomining.

    Using a global network of honeypots, Sysdig TRT was able to track TeamTNT’s cryptojcaking activity. The Sysdig research team attributed more than $8,100 worth of stolen cryptocurrency TeamTNT, which was mined on stolen cloud infrastructure, costing the victims more than $430,000.

    “This is calculated by figuring out how much it costs to mine one crypto coin on an AWS instance and comparing it to the dollar value of that coin,” Clark said.

    “The cost to the attacker is effectively zero while the victim gets to foot the expensive cloud infrastructure bill,” Clark said.

    Russia-Ukraine conflict contributes to DDoS attacks

     The Sysdig repot also noted that there has been a jump in DDoS attacks that use containers since the start of Russian invasion of Ukraine.

    “The goals of disrupting IT infrastructure and utilities have led to a four‑fold increase in DDoS attacks between 4Q21 and 1Q22,” according to the report. “Over 150,000 volunteers have joined anti‑Russian DDoS campaigns using container images from Docker Hub. The threat actors hit anyone they perceive as sympathizing with their opponent, and any unsecured infrastructure is targeted for leverage in scaling the attacks.”

    Otherwise, a pro-Russian hacktivist group, called Killnet, launched several DDoS attacks on NATO countries. These include, but are not limited to, websites in Italy, Poland, Estonia, Ukraine, and the United States.

    “Because many sites are now hosted in the cloud, DDoS protections are more common, but they are not yet ubiquitous and can sometimes be bypassed by skilled adversaries,” Sysdig noted.  “Containers pre‑loaded with DDoS software make it easy for hacktivist leaders to quickly enable their volunteers.”

    Preventing attacks on cloud systems

    Having a layered defense is the best way to prevent these attacks on cloud-based systems. according to Sysdig. “Cloud security teams should implement preventative controls like vulnerability and permissions management to make it difficult for attackers to compromise their infrastructure,” Clark said.

    Additionally, techniques such as machine-learning-based cryptominer detection should be used to alert security teams and block any attacks that make it through, he adds.

    and CIEM (cloud infrastructure entitlements manager) technology make it very hard for an attacker to provision instances on a legitimate user’s behalf, Clark said.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleThe data dividend: delivering a data and AI strategy that drives business value
    Next Article VMware acknowledges the wisdom of never buying version 1.0 of a product
    yourinfotech
    • Website

    Related Posts

    Apple’s original cloud photo sync service shuts down this summer

    May 30, 2023

    Cloud-based IT operations are on the rise

    May 26, 2023

    Google Cloud upgrades with next-gen accelerator that embiggens its VMs

    May 24, 2023

    Dark cloud over ChatGPT revolution: the cost

    May 22, 2023

    Leave A Reply Cancel Reply

    Our Picks

    Subscribe to Updates

    Get the latest creative news from Your Infotech about Information Technology.

    About Us
    About Us

    We provide a wide range of customized, integrated B2B and B2C digital marketing services solutions that are ideal for your business.

    We're accepting new partnerships right now.

    Email Us: info@yourmartech.com
    Contact: +1-530-518-1420

    Our Brands
    • Your Martech
    • Your HR Tech
    • Your Fin Tech
    • Your Revenue
    • Your Bio Tech
    • Your POS Tech
    • Your Health Tech
    SUBSCRIBE NOW
    Loading
    LinkedIn
    • Privacy Policy
    © 2023 Vigarbiz Inc. Designed by Vigarbiz Media.

    Type above and press Enter to search. Press Esc to cancel.