Close Menu
    Facebook X (Twitter) Instagram
    Jupiter News
    • Home
    • Technology
    • Tech Analysis
    • Tech News
    • Tech Updates
    • AI Technology
    • 5G Technology
    • More
      • Accessories
      • Computers and Laptops
      • Artificial Intelligence
      • Cyber Security
      • Gadgets & Tech
      • Internet and Networking
      • Internet of Things (IoT)
      • Machine Learning
      • Mobile Devices
      • PCs Components
      • Wearable Devices
    Jupiter News
    Home»Cyber Security»Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
    Cyber Security

    Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

    Jupiter NewsBy Jupiter NewsApril 15, 20244 Mins Read
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Apr 15, 2024NewsroomCloud Safety /SaaS Safety

    The menace actor generally known as Muddled Libra has been noticed actively concentrating on software-as-a-service (SaaS) purposes and cloud service supplier (CSP) environments in a bid to exfiltrate delicate knowledge.

    “Organizations usually retailer quite a lot of knowledge in SaaS purposes and use providers from CSPs,” Palo Alto Networks Unit 42 said in a report revealed final week.

    “The menace actors have begun trying to leverage a few of this knowledge to help with their assault development, and to make use of for extortion when making an attempt to monetize their work.”

    Muddled Libra, additionally referred to as Starfraud, UNC3944, Scatter Swine, and Scattered Spider, is a infamous cybercriminal group that has leveraged refined social engineering strategies to achieve preliminary entry to focus on networks.

    “Scattered Spider menace actors have traditionally evaded detection on the right track networks through the use of residing off the land strategies and allowlisted purposes to navigate sufferer networks, in addition to often modifying their TTPs,” the U.S. authorities said in an advisory late final yr.

    Cybersecurity

    The attackers even have a historical past of monetizing entry to sufferer networks in quite a few methods, together with extortion enabled by ransomware and knowledge theft.

    Unit 42 previously told The Hacker Information that the moniker “Muddled Libra” comes from the “complicated muddled panorama” related to the 0ktapus phishing equipment, which has been put to make use of by different menace actors to stage credential harvesting assaults.

    A key facet of the menace actor’s tactical evolution is using reconnaissance strategies to determine administrative customers to focus on when posing as helpdesk workers utilizing telephone calls to acquire their passwords.

    The recon section additionally extends to Muddled Libra, which performs intensive analysis to seek out details about the purposes and the cloud service suppliers utilized by the goal organizations.

    “The Okta cross-tenant impersonation attacks that occurred from late July to early August 2023, the place Muddled Libra bypassed IAM restrictions, show how the group exploits Okta to entry SaaS purposes and a corporation’s varied CSP environments,” safety researcher Margaret Zimmermann defined.

    The data obtained at this stage serves as a stepping stone for conducting lateral motion, abusing the admin credentials to entry single sign-on (SSO) portals to achieve fast entry to SaaS purposes and cloud infrastructure.

    Within the occasion SSO is just not built-in right into a goal’s CSP, Muddled Libra undertakes broad discovery actions to uncover the CSP credentials, probably saved in unsecured areas, to satisfy their aims.

    The information saved with SaaS purposes are additionally used to glean specifics concerning the contaminated setting, capturing as many credentials as potential to widen the scope of the breach by way of privilege escalation and lateral motion.

    “A big portion of Muddled Libra’s campaigns contain gathering intelligence and knowledge,” Zimmermann mentioned.

    Cybersecurity

    “Attackers then use this to generate new vectors for lateral motion inside an setting. Organizations retailer quite a lot of knowledge inside their distinctive CSP environments, thus making these centralized areas a chief goal for Muddled Libra.”

    These actions particularly single out Amazon Net Companies (AWS) and Microsoft Azure, concentrating on providers like AWS IAM, Amazon Easy Storage Service (S3), AWS Secrets and techniques Supervisor, Azure storage account entry keys, Azure Blob Storage, and Azure Recordsdata to extract related knowledge.

    Information exfiltration to an exterior entity is achieved by abusing respectable CSP providers and options. This encompasses instruments like AWS DataSync, AWS Switch, and a method referred to as snapshot, the latter of which makes it potential to maneuver knowledge out of an Azure setting by staging the stolen knowledge in a digital machine.

    Muddled Libra’s tactical shift requires organizations to safe their identification portals with strong secondary authentication protections like {hardware} tokens or biometrics.

    “By increasing their ways to incorporate SaaS purposes and cloud environments, the evolution of Muddled Libra’s methodology reveals the multidimensionality of cyberattacks within the trendy menace panorama,” Zimmermann concluded. “Using cloud environments to collect giant quantities of knowledge and rapidly exfiltrate it poses new challenges to defenders.”

    Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.





    Source link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Jupiter News
    • Website

    Related Posts

    Cyber Security April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    Cyber Security April 16, 2024

    Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack

    Cyber Security April 16, 2024

    FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations

    Cyber Security April 16, 2024

    Zambia arrests 77 people in swoop on “scam” call centre

    Cyber Security April 16, 2024

    Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability

    Cyber Security April 15, 2024

    Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw

    Leave A Reply Cancel Reply

    Don't Miss
    Machine Learning April 16, 2024

    Exploring Hugging Face: Text-to-Image | by Okan Yenigün | Apr, 2024

    Exploring Hugging Face’s Textual content-to-Picture Fashions: A Gateway to AI-Pushed ArtistryPicture by Gabriel Heinzer on…

    55 Best Podcasts (2024): True Crime, Culture, Science, Fiction

    April 16, 2024

    Actually, Corporate Investment in AI Saw a Significant Drop in 2023

    April 16, 2024

    ‘Bitcoin and stocks may be about to have major correction’, says analyst

    April 16, 2024

    Get an Echo Pop speaker with a free TP-Link smart light bulb for only $23

    April 16, 2024

    Hydrogen Is Coming to the Rescue

    April 16, 2024
    Categories
    • 5G Technology
    • Accessories
    • AI Technology
    • Artificial Intelligence
    • Computers and Laptops
    • Cyber Security
    • Gadgets & Tech
    • Internet and Networking
    • Internet of Things (IoT)
    • Machine Learning
    • Mobile Devices
    • PCs Components
    • Tech
    • Tech Analysis
    • Tech Updates
    • Technology
    • Wearable Devices
    About Us

    Welcome to JupiterNews.online – Your Gateway to the Tech Universe!

    At JupiterNews.online, we're on a mission to explore the vast and ever-evolving world of technology. Our blog is a digital haven for tech enthusiasts, innovators, and anyone curious about the latest trends shaping the future. With a finger on the pulse of the tech universe, we aim to inform, inspire, and connect our readers to the incredible advancements defining our digital age.

    Embark on a journey with JupiterNews.online, where the possibilities of technology are explored, celebrated, and demystified. Whether you're a tech guru or just getting started, our blog is your companion in navigating the exciting, ever-changing world of technology.

    Welcome to the future – welcome to JupiterNews.online!

    Our Picks

    Exploring Hugging Face: Text-to-Image | by Okan Yenigün | Apr, 2024

    April 16, 2024

    55 Best Podcasts (2024): True Crime, Culture, Science, Fiction

    April 16, 2024

    Actually, Corporate Investment in AI Saw a Significant Drop in 2023

    April 16, 2024

    ‘Bitcoin and stocks may be about to have major correction’, says analyst

    April 16, 2024

    Get an Echo Pop speaker with a free TP-Link smart light bulb for only $23

    April 16, 2024

    Hydrogen Is Coming to the Rescue

    April 16, 2024
    Categories
    • 5G Technology
    • Accessories
    • AI Technology
    • Artificial Intelligence
    • Computers and Laptops
    • Cyber Security
    • Gadgets & Tech
    • Internet and Networking
    • Internet of Things (IoT)
    • Machine Learning
    • Mobile Devices
    • PCs Components
    • Tech
    • Tech Analysis
    • Tech Updates
    • Technology
    • Wearable Devices
    • Privacy Policy
    • Disclaimer
    • Terms & Conditions
    • About us
    • Contact us
    Copyright © 2024 Jupiternews.online All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.