Cloud computing attacks grows as Desktop crypto-mining malware loses popularity
A report from Skybox Security indicates that desktop crypto-mining malware is becoming a thing of the past as cloud computing exploits become popular. Cloud computing attacks result in the creation of tons of infected computing containers online, and these attacks are becoming more rampant in 2019.
The use of desktop crypto-mining malware has dropped since the turn of last year, according to the report. In that time, vulnerabilities in cloud containers have gained the upper hand rising to about 46 percent from what it was in 2018.
“These remote services are capable of processing and storing large amounts of data required to mine cryptocurrencies”
Crypto mining malware like “Nansh0u campaign” has found its way into several desktop computers. Such malware use distributed control systems to mine Bitcoin and other cryptocurrencies. Such software usually preys on IT and media companies. They can get as much as 700 new victims on a daily basis.
However, cloud containers are taking things to a whole new level. These remote services are capable of processing and storing large amounts of data required to mine cryptocurrencies. Because of the large pool of data, they process per time; hackers can use them to their advantage.
A spokesperson of Skybox had this to say, “Cloud technology and adoption has obviously skyrocketed, so it’s no surprise that vulnerabilities within cloud technology will increase. What is concerning, though, is that as these are published, the race is on for attackers to develop an exploit because launching a successful attack on a container could have much broader consequences. Compared to other technology, containers can be more numerous and quickly replicated. The attack footprint could expand rapidly, and a number of victims may be extremely high.”
The sad news is that these vulnerabilities are increasing with each passing day, with more and more people falling victims to various forms of attack. In the first part of 2019, at least 7000 vulnerabilities were recorded.