• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Ransomware Goes Rogue against the Cloud!

February 18, 2019Simeon Georgiev

In mid 2000s, Amazon became one of the pioneers in the cloud computing industry as it released the highly popular AWS (Amazon Web Services). Soon, in the next decade, cloud computing gained recognition. Cloud is simply another name for “internet”. Businesses who use cloud can utilize remote IT infrastructure to make use of hardware, OS, and software level needs via a reliable internet connection. For example, if a retail business wants to store the inventory data, then it can use a cloud storage service which saves the hassle of purchasing, configuring, and maintaining an on-site storage device.

Other than cloud computing, artificial intelligence, machine learning, Internet of Things, augmented reality, and virtual reality have gained similar ground in the last decade. While these technologies promise a futuristic world with more comport, productivity, and efficiency, unfortunately, they remain in the crosshairs of cybercriminals. So who is their latest victim?

Hacking the Cloud

It is 2019 and the ransomware threat remains fresh as ever. Sometimes, it almost feels as if the laws of time have stopped working in this industry—they remained a top threat in 2015, 2016, 2017, 2018, and this year seems no different. Experts believe that this year, infections will target one of the most critical components of businesses—cloud hosted email solutions!

The prediction owes to the recent discovery by ransomware removal experts who discovered cases of corrupted G Suite and Office 365 while SharePoint sites and OneDrive files are other notable casualties of these attacks.

One of the major proponents of this hacking strategy is the proof-of-concept strain, RansomCloud. The demo of the ransomware was already shown to ransomware removalexperts in 2018 when the security professional, Kevin Mitnick, showed a live demonstration. The demonstration explained how the ransomware was able to infect Office 365.

Mitnick’s demonstration was followed by several reported cases in which cloud solutions were infected by cybercriminals.

Datto’s Annual Ransomware Report stated that out of 2,400 security professionals, almost 30 percent found SaaS applications to be threatened by the ransomware strains. About 50 percent of those analysts pointed out the infection in Microsoft Office 365 while 22% percent revealed G Suite as the hacked software.

According to a ransomware removal specialist, cloud ransomware attacks and regular ransomware attacks are quite different as the former are more serious and damaging in nature.

RansomCloud

As the name suggests, the ransomware is specifically designed to infiltrate the cloud. This entails attack on any of the SaaS application. Like regular ransomware attacks, these attacks can also use email phishing to trick their victims.

If G Suite and Office 365 are rendered useless through a cloud attack, then it means that the companies have nowhere to run to as their backup solution is in tatters.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Gearing Up Against the Ransomware Attacks Next post Olympia Financial Group Becomes Infected By Ransomware

Related Articles

Two Percent of Amazon Buckets Open To All, Potentially Exposed to Ransom Attacks

March 1, 2018Simeon Georgiev
Two Percent of Amazon Buckets Open To All, Potentially Exposed to Ransom Attacks

Victims Infected Through MicroTik Routers in Latest Cyber-Espionage Group Attack

March 12, 2018Simeon Georgiev
Victims Infected Through MicroTik Routers in Latest Cyber-Espionage Group Attack

Cybercriminals are Moving from Data Breaches to Ransomware Attacks

April 9, 2018Simeon Georgiev

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.