Engineers Garage

  • Electronics Projects and Tutorials
    • Electronic Projects
      • Arduino Projects
      • AVR
      • Raspberry pi
      • ESP8266
      • BeagleBone
      • 8051 Microcontroller
      • ARM
      • PIC Microcontroller
      • STM32
    • Tutorials
      • Audio Electronics
      • Battery Management
      • Brainwave
      • Electric Vehicles
      • EMI/EMC/RFI
      • Hardware Filters
      • IoT tutorials
      • Power Tutorials
      • Python
      • Sensors
      • USB
      • VHDL
    • Circuit Design
    • Project Videos
    • Components
  • Articles
    • Tech Articles
    • Insight
    • Invention Stories
    • How to
    • What Is
  • News
    • Electronic Product News
    • Business News
    • Company/Start-up News
    • DIY Reviews
    • Guest Post
  • Forums
    • EDABoard.com
    • Electro-Tech-Online
    • EG Forum Archive
  • DigiKey Store
    • Cables, Wires
    • Connectors, Interconnect
    • Discrete
    • Electromechanical
    • Embedded Computers
    • Enclosures, Hardware, Office
    • Integrated Circuits (ICs)
    • Isolators
    • LED/Optoelectronics
    • Passive
    • Power, Circuit Protection
    • Programmers
    • RF, Wireless
    • Semiconductors
    • Sensors, Transducers
    • Test Products
    • Tools
  • Learn
    • eBooks/Tech Tips
    • Design Guides
    • Learning Center
    • Tech Toolboxes
    • Webinars & Digital Events
  • Resources
    • Digital Issues
    • EE Training Days
    • LEAP Awards
    • Podcasts
    • Webinars / Digital Events
    • White Papers
    • Engineering Diversity & Inclusion
    • DesignFast
  • Guest Post Guidelines
  • Advertise
  • Subscribe

Study Reveals ‘Lurking Malice’ within Cloud Hosting Services

By Parul Gupta October 21, 2016

A study of 20 chief cloud hosting solutions has identified that as many as 10% of the sources hosted by them had been compromised – with numerous hundreds of the ‘buckets’ actively offering malware. Such disturbing content could be puzzling to find but because it can be easily assembled from stored elements that individually may not seem to be malicious.
 
 
                                                                                    Figure: Areas with bad repositories
 
To search the bad content, scientists prepared a scanning methodology that appears for features unique to the bad repositories, called as ‘Bars.’ The features comprise certain sorts of redirecting schemes and elements created to safeguard the malware from scanners. Scientists from the Georgia Institute of Technology, Indiana University Bloomington and the University of California Santa Barbara performed the research.
 
Considering the foremost systematic study of the cloud-based malicious role it will be introduced at the ACM Conference on Communications and Computer Security in Vienna, Austria. “Bad actors have shifted to the cloud along with everybody else,” says Raheem Beyah, a lecturer in Georiga Technology School of Computer and Electrical Engineering. “The troubling guys are utilizing the cloud to offer malware and other nefarious elements while remaining unidentified. The resources they utilize are compromised in a range of ways, from conventional exploits to just availing the advantage of poor configurations.
 
Beyah and his graduate student Xiaojing Liao identified that the bad actors could hide their roles by keeping elements of their malware in separate resources that by themselves did not boost conventional scanners. Only just they were required to launch an attack were the distinct parts of this malware association.
 
As a whole, the scientists scanned more than 140,000 sites on 20 cloud hosting sites and identified about 700 active sources for malicious content. In total, almost 10 percent of cloud repositories studied by the group in some way. The scientists stated that the cloud is hosting entities of their findings before the introduction of the study. “It is pervasive in the cloud,” says Beyah. “We identified that problem in every last element of the hosting services we analysed. We believe this is a major problem for the cloud-hosting industry.”
 
In some situations, the bad actors opened a costly account and instigated hosting their software. In other situations, the malicious content was hidden in the cloud – based domains of the well – known brands. Linking the bad content with good content in the brand domains safeguarded the malware from blacklisting of the domain.
 
Liao and Beyah saw an extensive assortment of attacks in the cloud – hosted repositories, varying from common and phishing drives by downloads to faulty antivirus and computer update sites. 
 
“They can attack you from such buckets, or they can redirect you to the other malicious buckets or a range of malicious buckets,” he confirms. “It can be troubling to witness where the code is directing you.” To safeguard cloud-based sources from such attacks, Beyah suggests that the typical defences, comprising patching of systems and appropriate configuration settings. “Attackers are intelligent, and as we safeguard things and make the cloud infrastructure more difficult for them to attack, they will shift onto something else,” he says.

Filed Under: News

 

Next Article

← Previous Article
Next Article →

Questions related to this article?
👉Ask and discuss on EDAboard.com and Electro-Tech-Online.com forums.



Tell Us What You Think!! Cancel reply

You must be logged in to post a comment.

EE TECH TOOLBOX

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE Learning Center

EE Learning Center
“engineers
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

HAVE A QUESTION?

Have a technical question about an article or other engineering questions? Check out our engineering forums EDABoard.com and Electro-Tech-Online.com where you can get those questions asked and answered by your peers!


RSS EDABOARD.com Discussions

  • Simple Active Bandpass Filter Oscillates
  • De-embedding using Y, Z parameter
  • i need an embedded c program that will read a 12 bit memory address from the io pins and output the data to pins from the memory in a 8051 mcontroller
  • Gate Driver Suggestions for Two-Switch Non-Inverting Buck-Boost Converter
  • DC/DC Converter with wide range input

RSS Electro-Tech-Online.com Discussions

  • Behringer MX 1602 mixer - reading block diagram
  • STM32 checking self-written delay function
  • Reclaiming missing motherboard header
  • 12v battery, 18v magic
  • Actin group needed for effective PCB software tutorials

Featured -USB Series

  • Controller Chip Selection for Developing USB Enabled Device (Part 6/6)
  • Signal and Encoding of USB System (Part 5/6)
  • USB Requests and Stages of Control Transfer (Part 4/6)
  • USB Descriptors and their Types (Part 3/6)
  • USB Protocol: Types of USB Packets and USB Transfers (Part 2/6)
  • Introduction to USB: Advantages, Disadvantages and Architecture (Part 1/6)

Recent Articles

  • Littelfuse driver achieves less than 1 µA standby current for energy-efficient designs
  • Microchip optimizes power consumption in transceiver-less FPGA design for automotive applications
  • What is an IoT platform and when is one useful?
  • Silanna launches laser driver IC with sub-2 ns FWHM pulse for LiDAR application
  • LEM introduces current sensors with bandwidth up to 2.5 MHz for precision applications

EE ENGINEERING TRAINING DAYS

engineering

Submit a Guest Post

submit a guest post
Engineers Garage
  • Analog IC TIps
  • Connector Tips
  • Battery Power Tips
  • DesignFast
  • EDABoard Forums
  • EE World Online
  • Electro-Tech-Online Forums
  • EV Engineering
  • Microcontroller Tips
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • 5G Technology World
  • Subscribe to our newsletter
  • About Us
  • Contact Us
  • Advertise

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy

Search Engineers Garage

  • Electronics Projects and Tutorials
    • Electronic Projects
      • Arduino Projects
      • AVR
      • Raspberry pi
      • ESP8266
      • BeagleBone
      • 8051 Microcontroller
      • ARM
      • PIC Microcontroller
      • STM32
    • Tutorials
      • Audio Electronics
      • Battery Management
      • Brainwave
      • Electric Vehicles
      • EMI/EMC/RFI
      • Hardware Filters
      • IoT tutorials
      • Power Tutorials
      • Python
      • Sensors
      • USB
      • VHDL
    • Circuit Design
    • Project Videos
    • Components
  • Articles
    • Tech Articles
    • Insight
    • Invention Stories
    • How to
    • What Is
  • News
    • Electronic Product News
    • Business News
    • Company/Start-up News
    • DIY Reviews
    • Guest Post
  • Forums
    • EDABoard.com
    • Electro-Tech-Online
    • EG Forum Archive
  • DigiKey Store
    • Cables, Wires
    • Connectors, Interconnect
    • Discrete
    • Electromechanical
    • Embedded Computers
    • Enclosures, Hardware, Office
    • Integrated Circuits (ICs)
    • Isolators
    • LED/Optoelectronics
    • Passive
    • Power, Circuit Protection
    • Programmers
    • RF, Wireless
    • Semiconductors
    • Sensors, Transducers
    • Test Products
    • Tools
  • Learn
    • eBooks/Tech Tips
    • Design Guides
    • Learning Center
    • Tech Toolboxes
    • Webinars & Digital Events
  • Resources
    • Digital Issues
    • EE Training Days
    • LEAP Awards
    • Podcasts
    • Webinars / Digital Events
    • White Papers
    • Engineering Diversity & Inclusion
    • DesignFast
  • Guest Post Guidelines
  • Advertise
  • Subscribe