carbonite logo

Commonly searched topics:

backupcloud backupaccount sign in

Article · Nov 10, 2020

Cloudjacking: One More Reason to Back Up Your Data

Cloudjacking and cloud mining are gaining popularity as ways from cybercriminals to lock down data and profit from your cloud resources.

Cloudjacking and cloud mining may not be familiar terms among general tech audiences, but they're being used more often to steal data and resources. A potential new entry point for ransomware attacks, they make data backup an even more critical component of any cyber resilience plan. To understand the threat, let's first define some terms.

  • Cloudjacking—The practice of gaining illicit asset to a company or organization’s cloud computing resources, often by seeking out misconfigured cloud accounts or web development tools.
  • Cloud mining—Similar to cryptojacking, stealing cloud computing resources including electricity and CPU to mine for cryptocurrencies without the owner or renter’s knowledge.

So, cloudjacking is the act of gaining access to cloud resources, and cloud mining is one potential activity threat actors may conduct once in. The other is ransomware. Given the increased importance of cloud computing for organizations of all sizes, this second tactic represents a real and growing threat to organizations of all sizes and in all verticals.

“Hackers have definitely transitioned away from launching ransomware attacks indiscriminately,” says Webroot™ threat analyst Tyler Moffitt. “It used to be, ‘everybody gets the same payload, everyone has the same flat-rate ransom.’

“That’s all changed. Now, ransomware actors want to go after businesses with large attack surfaces and more pocketbook money than, say, grandma’s computer to pay if they’re breached. Cloud is essentially a new market.”

Cloudjacking in the news

Arguably the most famous example of cloudjacking, at least in terms of headlines generated, was a 2018 attack on the electric car manufacturers Tesla. In that incident, cybercriminals were discovered running malware to leech the company’s Amazon Web Service cloud computing power to mine cryptocurrency.

Even with an organization of Tesla’s scale, the attackers reportedly used a throttling technique to ensure their operations weren’t uncovered. Ultimately, they were reported by a third-party that was compensated for their discovery. 

More recently, the hacking group TeamTNT developed a worm capable of stealing AWS credentials and implanting cloudjacking malware on systems using the cloud service. It does this by searching for accounts using popular development tools, like Docker or Kubernets, that are both improperly configured and running AWS, then performing a few simple searches for the unencrypted credentials.

TeamTNT’s total haul remains unclear, since it can spread it’s ‘earnings’ across multiple crypto wallets.  The fear though, now that a proven tactic for lifting AWS credentials is out in the wild, is that misconfigured cloud accounts will become prime targets for widespread illicit cloud mining.

Small businesses as targets

Hackers aren’t just launching cloudjacking attacks specifically against storage systems and development tools. As with other attack tactics, they often see MSPs and small and medium-sized businesses (SMBs) as attractive targets as well.

“Several attacks in the first and second quarters of 2019 involved bad actors hijacking multiple managed service providers,” says Moffitt. “We saw that with Sodonakibi and GrandCrab. The same principles apply here. Hacking a central, cloud-based property allows attackers to hit dozens and potentially hundreds of victims all at once.”

Because smaller businesses typically share their cloud infrastructure with other small businesses, compromising cloud infrastructure can provide cybercriminals with a trove of data belonging to several concerned owners.

“The cloud offers an attractive aggregation point as it allows attackers access to a much larger concentration of victims. Gaining access to a single Amazon web server, for instance, could allow threat actors to steal and encrypt data belonging to dozens of companies renting space on that server hostage,” says Moffitt. 

High-value targets include confidential information like mission-critical data, trade secrets, unencrypted tax information or customer information that, if released, would violate privacy laws like GDPR and CCPA.

Some years ago, smaller businesses may have escaped these cloud compromises without too much disruption. Today, the data and services stored or run through the cloud are critical to the day-to-day even for SMBs. Many businesses would be simply crippled should they lost access to public or private cloud assets.

The pressure to pay a ransom, therefore, is significantly higher than it was even three years ago. But ransoms aren’t the only way for malicious actors to monetize their efforts. With cloud mining, they can get right to work making cryptocurrency while evading notice for as long as possible.

How to protect against cloudjacking and cloud mining

Moffitt recommends using “versioning” to guard against cloudjacking attacks. Versioning is the practice of serializing unalterable backups to prevent them from being deleted or manipulated.

“That means not just having snapshot or history copies—that’s pretty standard—since with ransomware we’ve seen actors encrypt all of those copies. So, my suggestion is creating immutable backups. It’s called versioning, but these are essentially snapshot copies that can never be edited or encrypted.”

Moffitt says many service providers have this capability, but it may not be the default and need to be switched on manually.

Two more tactics to adopt to defend against cloud jacking involve monitoring your configurations and monitor your network traffic. As we’ve seen, capitalizing on misconfigured AWS infrastructure is one of the more common ways for cybercriminals to disrupt cloud services.

Security oversight of devops teams setting up cloud applications is crucial. There are tools available that can automatically discover resources as soon as they’re created, determine the applications running on the resource and apply appropriate policies based on the resource type.

By monitoring network traffic and correlating it with configuration data, companies are able to spot suspicious network traffic being generated as they send work or hashes to public mining pools that are public and could help identify where mining is being directed. 

As always, securely backing up business data is one of the most effective defenses against ransomware and an essential component of cyber resilience. Regardless of how many new methods for delivering ransomware are developed by cybercriminals, having off-site encrypted backups reduces the leverage cybercriminals command over your business, should its own cloud infrastructure become compromised.

Author

Kyle Fiehler

Kyle Fiehler is a writer and brand journalist for Carbonite. For over 5 years he's written and published custom content for the tech, industrial, and service sectors. He now focuses on articulating the Carbonite brand story through collaboration with customers, partners, and internal subject matter experts.

Related content