HomeVulnerabilityRansomware goes cloud native to focus on your backup infrastructure

Ransomware goes cloud native to focus on your backup infrastructure

Kasabji added: “Remoted, versioned, and access-controlled restoration tiers have gotten non-negotiable.”

Ransomware gangs have turned the sufferer’s personal cloud-based instruments towards them. For instance, infamous teams reminiscent of BlackCat (ALPHV) and Rhysida have actively exploited entry to Azure Blob Storage, Amazon S3 Switch Acceleration, and backup companies reminiscent of Azure Storage Explorer to exfiltrate and encrypt delicate information.

“The menace goes past encryption — adversaries are modifying lifecycle insurance policies to auto-delete information inside days, as seen in Codefinger’s assaults, making a manufactured sense of urgency,” stated Cameron Sipes, director of cloud security at SentinelOne. “These techniques bypass conventional endpoint security and leverage the elasticity of cloud assets for quick, difficult-to-reverse impression.”

See also  February 2026 Patch Tuesday: Six new and actively exploited Microsoft vulnerabilities addressed
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular