Advanced cyberattacks on cloud environments often make headline news, but these attacks occur in small numbers. The majority of cyberattacks on cloud environments are conducted using well-known threat actor attack techniques such as using stolen credentials and exploiting security weaknesses such as misconfigurations. As such, the best defense against cloud intrusions is to focus on simple cloud security hygiene as this will raise the bar for attackers and will dramatically reduce the risk of a cloud compromise.
According to the recently published Q3, 2023 Google Cloud Threat Horizons Report, a majority of cloud compromises saw initial access gained by exploiting poor password practices. 54.3% of cloud compromises were due to weak or no passwords, with a large percentage of those attacks involving brute forcing default accounts, Secure Shell (SSH), and the Remote Desktop Protocol (RDP). 15.2% of attacks saw initial access gained as a result of misconfigurations, and the same percentage of attacks were due to sensitive UI or API exposure. 10.9% of attacks saw initial compromise achieved by exploiting vulnerable software.
The Google Cloud research and analysis team has identified persistent threat actor activity targeting cloud-hosted Software-as-a-Service (SaaS) systems. Organizations are increasingly using SaaS applications, which increases the attack surface considerably. According to the Thales 2023 Cloud Security Report, there was a 41% increase in the mean number of SaaS applications used by organizations between 2021 and 2023. 55% of surveyed security executives say they have experienced data breaches, leaks, malicious applications, ransomware, espionage, or insider attacks related to SaaS applications in the past 2 years, which indicates organizations are failing to adequately protect SaaS data. This is particularly worrying since SaaS data is the least likely data to be recovered in a ransomware attack.
There is a growing trend where malicious actors abuse public cloud services to host their command-and-control infrastructure, rather than using their own infrastructure or leasing it from other threat actors. The threat actors benefit from cheap, reliable infrastructure that is trusted by enterprises and consumers, and they can hide their activity by blending into high volumes of legitimate traffic. Threat actors have long abused Microsoft Azure, Amazon Web Service, and Dropbox but they may also be abusing Google Calandar. Proof-of-concept code has been published on GitHub for a Google Calendar Remote Access Trojan (RAT), and researchers at Mandiant note that the code has been actively shared on underground forums, indicating threat actors’ interest in the Google Calendar RAT. Since the malware communicates with legitimate infrastructure operated by Google, it is difficult for defenders to detect suspicious activity.
Typosquatting has long been used by threat actors in their campaigns. This tactic involves registering domains similar to the brand being targeted to catch out careless typists. Typosquatting is now being used in attacks on cloud storage platforms such as Google Cloud Storage, Amazon S3, and Azure Blob. A random sample of ten Fortune 100 companies found that 60% had one or more typosquatted cloud storage URLs.
The Q3, 2023 Google Cloud Threat Horizons Report includes a review of cloud services adoption in the healthcare industry and identifies some of the common security issues. An analysis of cloud security incidents between 2021-2023 found cloud services are increasingly being targeted in attacks on healthcare organizations and cloud services are being increasingly used as a platform for staging attacks. While the majority of these attacks were not new, the team found that the attacks are increasingly negatively affecting patient safety, such as by degrading healthcare organizations’ operational capacity, causing patients to be redirected to more distant facilities, and delaying diagnosis and treatment.
The attacks studied by Google and Mandiant revealed that most attacks on the healthcare industry are conducted by financially motivated threat actors who most commonly use stolen credentials for initial access, and to a lesser extent, phishing, third-party vulnerabilities, denial of service attacks, web exploits, and misconfigurations. By far the most common follow-on compromises were ransomware and data extortion attacks, where the attackers attempt to find and capture PHI for extortion purposes, with or without accompanying data encryption. Credentials and data are commonly extracted by targeting Outlook Web Access application and AWS resources such as S3. In the report, the Google Cloud team offers several mitigations that can reduce the risk of attacks on cloud services and prevent credential and session abuse, data exfiltration and extortion, ransomware and data destruction, web exploits, third-party software vulnerability exploitation, DoS attacks, malware delivery, and social engineering attacks.
“The healthcare sector is a prime target for cyber attackers. It is imperative that healthcare-driven organizations recognize that patient data and medical device vulnerabilities demand urgent attention and protection,” Taylor Lehmann, Director, Office of the CISO, Google Cloud told The HIPAA Journal. “Cybersecurity must be integrated into the core of healthcare operations to safeguard clinical and personal data, as well as patient safety. This requires a collective effort, where cooperation between healthcare providers, industry leaders, and government becomes the linchpin of defense against these relentless cyber adversaries.”
The post Malicious Actors Increasingly Targeting Cloud Services in Healthcare Cyberattacks appeared first on HIPAA Journal.