• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

Threat actors abuse Microsoft Azure cloud services to host malware and as command and control (C&C) servers.

5709

Hackers today are with great interest at cloud services platform -an emerging and promising computing model that provides on-demand computing services which eliminates the need of bearing operational costs associated with deploying servers and software applications, so that it could be abused for several malicious purposes like strong malware or implementing command and control servers. Security researchers have already spotted traces of some malware hosted on Microsoft Azure platform and now, it seems to be the turn for Microsoft Azure to host tech-support scam and phishing templates. The traces of attackers deploying malware on the Microsoft Azure Platform is seemed to be observed by researchers at AppRiver, but the bad news is that the malware seemed to were not removed even after some weeks, on May 29. “Now the attacks have escalated to malware being hosted on the Azure service. Not only is Azure hosting malware, but it is also functioning as the command and control infrastructure for the malicious files” reads the analysis published by AppRiver.

“On May 11, 2019, malware researchers @JayTHL & @malwrhunterteam discovered the malicious software on Azure. It was reported to Microsoft on May 12 for abuse via ticket #SIR0552640. However, the original malware (plus additional samples uploaded since) still resided on the Azure site as of May 29, 2019 – 17 days later.”

Experts from AppRiver have pointed out that Azure is failing to detect the malware hosted on Microsoft's servers.

They said, “No service is infallible to being attacked or exploited. It’s evident that Azure is not currently detecting the malicious software residing on Microsoft’s servers. However, if a user attempts to download the executables, Windows Defender does detect the malicious files.”

In one case, a sample named searchfile.exe was uploaded to VirusTotal on April 26, 2019. Even if Windows Defender detects the malware its presence on Azure is currently failing to block the upload.

Experts believe that this trend will continue to grow, and hackers will not only abuse Microsoft Azure, but other cloud services (i.e. Dropbox, Google Drive, and Amazon) will be exploited by hackers to avoid detection.

Tags:
gibbons
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 0 )

No questions available

Related Tutorials in Threat actors abuse Microsoft Azure cloud services to host malware and as command and control (C&C) servers.

Related Tutorials in Threat actors abuse Microsoft Azure cloud services to host malware and as command and control (C&C) servers.

How to create and configure Load Balancer on Microsoft Azure
How to create and configure Load Balancer on Microsoft Azure
Oct 31, 2022
How to Deploy and Configure Azure Application Gateway
How to Deploy and Configure Azure Application Gateway
Dec 26, 2022
How to create, attach, and mount a disk to Linux VM (Microsoft Azure)
How to create, attach, and mount a disk to Linux VM (Microsoft Azure)
Mar 21, 2023
AWS vs AZURE Comparison
AWS vs AZURE Comparison
Feb 19, 2021
How to install Nginx on Azure Linux virtual machine
How to install Nginx on Azure Linux virtual machine
Oct 22, 2022
How to create Microsoft Azure Virtual Machine Scale Sets
How to create Microsoft Azure Virtual Machine Scale Sets
Nov 7, 2022
How to Create a managed image of a generalized VM in Azure
How to Create a managed image of a generalized VM in Azure
Jan 4, 2023
How to Create Virtual Network, Subnet, Vnet Peering on Azure
How to Create Virtual Network, Subnet, Vnet Peering on Azure
Dec 6, 2022

Related News in Threat actors abuse Microsoft Azure cloud services to host malware and as command and control (C&C) servers.

Related News in Threat actors abuse Microsoft Azure cloud services to host malware and as command and control (C&C) servers.

Microsoft makes its Azure App service now available on Linux Systems
Microsoft makes its Azure App service now available on Linux Systems
Sep 7, 2017
Chrome extension Trojan tricks victims in an endless malware loop
Chrome extension Trojan tricks victims in an endless malware loop
Apr 29, 2017
Dridex rears its ugly head again.
Dridex rears its ugly head again.
Apr 6, 2017
Threat actors abuse Microsoft Azure cloud services to host malware and as command and control (C&C) servers.
Threat actors abuse Microsoft Azure cloud services to host malware and as command and control (C&C) servers.
Jun 12, 2019
WordPress and Joomla websites infected by new backdoor malware
WordPress and Joomla websites infected by new backdoor malware
May 31, 2019
Microsoft previews new Azure Container Instance service on Linux
Microsoft previews new Azure Container Instance service on Linux
Jul 28, 2017
Did you know that 40% of VirtualMachines in Azure are running Linux?
Did you know that 40% of VirtualMachines in Azure are running Linux?
Nov 4, 2017
Free malware-as-a-service MacSpy hits Mac OS
Free malware-as-a-service MacSpy hits Mac OS
Jun 14, 2017
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help David Lopez Guillen ?
Ayuda urgente instale SSL para servidor Opensuse y ahora no funciona tengo servicio web

hola segui este tutorial para tener un certificado ssl y ahora no se ve mi app en la red, espero alguien pueda ayudarme, tengo M9oodle en3.5 en un servidor open suse y ahora no funciona por favor ayuda.

https://www.linuxhelp.com/how-to-create-ssl-certificate-in-opensuse

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.