Attackers are using cloud services to mask attack origin and build false trust
Title | Attackers are using cloud services to mask attack origin and build false trust |
Publication Type | Magazine Article |
Year of Publication | 2018 |
Authors | James Sanders |
Magazine | Tech Republic |
Edition | Security |
Date Published | 12/19/2018 |
Keywords | Articles of Interest, C3E 2019, cloud services, Cognitive Security, Cognitive Security in Cyber, Hacking, Malware |
Abstract | According to a report released by Menlo Security, the padlock in a browser's URL bar gives users a false sense of security as cloud hosting services are being used by attackers to host malware droppers. The use of this tactic allows attackers to hide the origin of their attacks and further evade detection. The exploitation of trust is a major component of such attacks. |
URL | https://www.techrepublic.com/article/attackers-are-using-cloud-services-to-mask-attack-origin-and-bu... |
Citation Key | node-62456 |