SSH is the cloud service most targeted by hackers with 68.2% of attack cases, according to a new report from Cado Security

2023-08-13 19:51:54

A new report from Cado Security examines the evolving cloud computing threat landscape and highlights the increased risk of cyberattacks due to the rapid adoption of cloud computing-enabled services. The report shows that SSH is the most commonly targeted service, with 68.2% of the observed samples, followed by Redis with 27.6% and Log4Shell traffic with only 4.3%, indicating a change in the strategy of threat actors who no longer favor vulnerability as the initial means of access.

“Our goal with this report is to equip incident responders and security professionals with essential knowledge, enabling them to adequately secure their organization in this rapidly changing threat environment,” said James Campbell. , CEO and co-founder of Cado Security. “By sharing our key findings, we confirm our commitment to continually invest in initiatives aimed at strengthening the broader security community.”

Botnet agents turn out to be the most common malware category, accounting for around 40.3% of all traffic. The use of Botnet networks has been particularly relevant in the context of the war between Russia and Ukraine, where they have been used by hacktivists on both sides to carry out DDoS attacks on strategic targets.

The majority (97.5%) of opportunistic actors search for vulnerabilities in a single specific service to identify vulnerable instances deployed in the wild. This can be because attackers know of a specific vulnerability in a particular service or have development experience in that area.

“As a threat researcher, I take great pride in fostering a culture that emphasizes investment and focuses on areas dedicated to researching the latest attack patterns,” said Chris Doman, CTO and Co-Founder of Cado Security. “Building an outstanding team of experts who share this vision is a testament to our commitment to building the collective power of the security community. Our researchers proactively monitor cloud-focused attack techniques and generate results that serve foundation to developing industry-leading resources that enable security teams to remain at the forefront of securing organizations around the world.”

Source : Cado Security

And you ?

Do you think this study is credible or relevant?

See as well :

Delinea’s latest Cloud Suite reduces the risk of lateral movement in the event of a cybersecurity breach with privileged access and permissions for servers

Weak passwords still allow hackers to break into networks. 83% of compromised passwords meet cybersecurity compliance standards

70% of IT decision makers in the public sector reject the cloud or make it an option of last resort or have no strategy on the subject, according to Devoteam

1691957638
#SSH #cloud #service #targeted #hackers #attack #cases #report #Cado #Security

Share:

Facebook
Twitter
Pinterest
LinkedIn

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.