Attackers use automation to increase speed from exploits
Attackers are using automation to increase speed from exploit to compromise, according to a new report.
Cloud security firm Lacework has released the fourth Lacework Labs Cloud Threat Report, which examines the cloud security threat landscape over the past three months and unveils the new techniques and avenues cybercriminals are exploiting for profit at the expense of businesses.
In this latest edition, the Lacework Labs team found a significantly more sophisticated attacker landscape, with an increase in attacks against core networking and virtualisation software, and an unprecedented increase in the speed of attacks following a compromise.
Key trends and threats identified include:
Increased speed from exposure to compromise
Attackers are advancing to keep pace with cloud adoption and response time. Many classes of attacks are now fully automated to capitalise on timing. Additionally, one of the most common targets is credential leakage. In a specific example from the report, a leaked AWS access key was caught and flagged by AWS in record time. Despite the limited exposure, an unknown adversary was able to login and launch tens of GPU EC2 instances, underscoring just how quickly attackers can take advantage of a single simple mistake.
Increased focus on infrastructure, specifically attacks against core networking and virtualisation software
Commonly deployed core networking and related infrastructure consistently remains a key target for adversaries. Core flaws in infrastructure often appear suddenly and are shared openly online, creating opportunities for attackers of all kinds to exploit these potential targets.
Continued Log4j reconnaissance and exploitation
Nearly a year after the initial exploit, the Lacework Labs team is still commonly observing vulnerable software targeted via OAST requests. Analysis of Project Discovery (interact.sh) activity revealed Cloudflare and DigitalOcean as the top originators.
Lacework has also launched a new, open source tool for cloud hunting and security efficacy testing.
The new tool, known as Cloud Hunter, will help customers keep pace with ever-improving adversarial tradecraft through advanced environmental analysis and improved incident response time.
Developed in response to new types of sophisticated threat models uncovered through Lacework Labs’ research, Cloud Hunter utilises the Lacework Query Language (LQL) to permit hunting across data within the Lacework platform by way of dynamically-created LQL queries.
Customers can quickly and easily find data and develop queries for ongoing monitoring as they scale detections along with their organisation's cloud security program. Data is automatically analysed while Cloud Hunter extracts information, further streamlining the capabilities and response times for incident investigations.
“Creating an open source tool not only extends our capabilities as a research team and company, but also gives us a way to fully give back to and empower the developer community based on what we’re seeing from our threat research,” says James Condon, Director of Threat Research at Lacework.
“As our research shows an increasingly more sophisticated attack landscape, this tool provides a more detailed analysis of an organisation’s unique environment based on the new techniques being leveraged by attackers. Cloud Hunter is the first tool from Lacework to generate queries that can be directly converted into custom policies within a customer’s environment.”
The Lacework Labs team also examined issues around how “rogue accounts” are utilised by attackers for the reconnaissance and probing of S3 buckets as well as the growing popularity of cryptojacking and steganography.