Outsourcing

Outsourcing Malicious Infrastructure to the Cloud

Free registration required

Executive Summary

Malicious activities, such as running botnets, phishing sites or keyloggers, require an underlying infrastructure for carrying out vital operations like hosting coordination mechanisms or storing stolen information. In the past, attackers have used their own resources or compromised machines. In this paper, the authors discuss the emerging practice of attackers outsourcing their malicious infrastructure to the Cloud. They present the findings from the study of the first major keylogger that has employed Pastebin for storing stolen information. Furthermore, they outline the traits and features of Cloud services in facilitating malicious activities. Finally, they discuss how the nature of the Cloud may shape future security monitoring and enhance defenses against such practices.

  • Format: PDF
  • Size: 247.8 KB