Poorly suspended cloud services can be exploited by intimidating actors in minutes and sometimes in less than 30 seconds. The attacks include network infiltration, data theft and ransomware infections, researchers have found.
Researchers at Palo Alto Networks‘ Unit 42 used honeypot infrastructure for 320 nodes deployed around the world to optimize critical cloud-based resources – including desktop protocol (RDP), security shell protocol (SSH), i -server block (Samba) and Postgres database.
The attackers jumped at the chance to exploit the situation, and 80 percent of the 320 honeycombs were in danger within 24 hours.
In addition, another attack took place in a matter of minutes, when one of the most dangerous characters threatened 96 percent of 80 honeycombs worldwide in 30 seconds, researchers found.
Read More: Threatpost
For more such updates follow us on Google News ITsecuritywire News