article thumbnail

Threat Alert: New Malware in the Cloud By TeamTNT

Aqua Security

The scripts and malware that were used bear a striking resemblance to none other than the threat actor TeamTNT. Since then, we have only seen legacy attacks which automatically run on past infrastructure. In this blog we analyze these attacks and their possible connection to TeamTNT.

Malware 145
article thumbnail

AndroxGhost – the python malware exploiting your AWS keys

Lacework

Hackers may hijack AWS infrastructure for a number of reasons. While cryptomining is more profitable on infrastructure owned by somebody else, the same can also be said for SMTP abuse and spam. For AWS specifically, the malware scans for and parses AWS keys but also has the ability to generate keys for brute force attacks.

Malware 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Investing in Cloud Infrastructure in the Kingdom of Saudi Arabia

Palo Alto Networks

Local Cybersecurity Cloud Infrastructure to Support Digital Transformation Digital transformation is at the heart of the Kingdom of Saudi Arabia’s ambitious Vision 2030 program as the nation looks to future-proof its economy and enhance people’s lives. All other marks mentioned herein may be trademarks of their respective companies.

article thumbnail

Stop Zero-Day Malware With Zero Stress With PAN-OS 11.0 Nova

Palo Alto Networks

With the sophistication of today’s threat landscape, malware is more evasive than ever. Nova – the next evolution of network security that allows you to stop zero-day malware with zero stress. The Evolution of Modern Malware. Modern malware is increasingly evasive. Today, we’re announcing PAN-OS 11.0

Malware 106
article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This ancient technique has found its place in the world of malware, namely hiding malicious code within other files including image formatted files ( T1027.003 ). This blog takes a look at the latter technique in recent cryptojacking activity from a group known as WatchDog. Steg malware is uncommon relative to other malware.

Malware 96
article thumbnail

Why you must extend Zero Trust to public cloud workloads

CIO

A recent study shows that 98% of IT leaders 1 have adopted a public cloud infrastructure. However, it has also introduced new security challenges, specifically related to cloud infrastructure and connectivity between workloads as organizations have limited control over those connectivity and communications. 8 Complexity.

Cloud 323
article thumbnail

“Spytech Necro” – Keksec’s Latest Python Malware

Lacework

The post “Spytech Necro” – Keksec’s Latest Python Malware appeared first on Lacework.

Malware 92