“Music is the Strongest form of magic”
-Marilyn Manson
This is the first post on my new blog. I’m just getting this new blog going, so stay tuned for more. Subscribe below to get notified when I post new updates.
“Music is the Strongest form of magic”
-Marilyn Manson
This is the first post on my new blog. I’m just getting this new blog going, so stay tuned for more. Subscribe below to get notified when I post new updates.
Disclaimer: “This report was generated as part of a student project in the Cyber Threat Intelligence course at the Georgia Institute of Technology (Georgia Tech) and overseen by Professor Sergio Caltagirone. The accuracy of this information cannot be guaranteed.”
Summary
The cloud native environments are facing an increasing threat from sophisticated ransomware attacks. These attacks are causing significant damage, including data breaches, financial losses, and reputational harm. Zero-day vulnerabilities pose a particularly severe risk, and currently there is no margin for human error in cloud configuration as this has proven catastrophic in several instances. Additionally, the rise of new cybercrime groups and their strategic partnerships are enhancing their capabilities, making it easier for them to penetrate defenses. Furthermore, the never-ending emergence of vulnerabilities coupled with the lack of visibility in cloud environments raises concerns about their viability as a future investment option.
Implementing zero-trust policies can significantly enhance security by ensuring that no entity, whether inside or outside the network, is trusted by default. Regular security audits and employee training on best practices for cloud security and identifying phishing attempts are also crucial in minimizing the risk of misconfigurations and human errors.
Key Findings
Background
Instances of cyber-attacks involving cloud environments or ransomware are numerous in the past 18 months. My data shows that when these two threat surfaces intersect, the focus often shifts disproportionately to one element, leading to skewed interpretations. Reports detail various TTPs (Tactics, Techniques, and Procedures) used by cyber gangs and ransomware groups, but often omit the victims. These TTPs are likely to affect multiple victims. While Fig. 1 does not depict the true trend of ransomware-in-cloud cyber-attacks, it just serves to illustrate how the collected data from various sources are distributed over time.

Figure 1 | Distribution of collected data over time. The peak during June 2023 is because of the MOVEIt vulnerability being exposed which in turn led to a cascade of cyberattacks on various organizations. [Data available upon request :)]
Nation-state-sponsored cyber-attacks on cloud environments have increased, driven by espionage and financial motives. Countries like Russia, China, Iran, and North Korea are highly likely to target zero-day vulnerabilities in major platforms like Azure and AWS, aiming at a global range of victims. Whereas ransomware and cybercrime groups have expanded to “one-to-many” attacks on cloud environments, particularly Azure. The distribution of the cyberattacks by the threat actor is presented in Fig. 2.
Intelligence details
1. Nation-state cyber actors
Each nation-state’s motives are influenced by their economic conditions and ongoing conflicts. For example:
The integration of cloud services into critical and public infrastructure, such as nuclear power plants and water supply systems, significantly enhances the potential for adversaries to use cyber-offensive tactics against another nation-state. [6][7] These insights underscore the need for nation-states and organizations alike to allocate more resources towards strengthening their cloud-native environments.
2. Cybercrime and ransomware gangs migrating into cloud-native environments
The ransomware groups have expanded their domain with “one-to-many” attacks to target cloud environments. From the adversary’s perspective, the advantage with cloud native environments is the lack of visibility and the widespread adaptation. Once they identify a vulnerability or a zero-day, they can exploit all the users with the cloud environment and lack of visibility means that the victim might not even be able to trace back the origins causing severe disruption of services. For instance, threat actors “Shiny Hunters” used compromised credentials to gain access to Snowflake cloud storage accounts for as many as 165 customers across multiple industries. This exposure has had a cascading effect, wherein Ticketmaster and Santander Bank’s user information were breached and leaked as a result. [8] Further, this leak could allow threat actors to pivot into more sensitive OT environments that could enable operational disruption. This group is also attributed to carrying out a cloud extortion campaign (Bling Libra) to access AWS environments. [9]

Figure 2 | Distribution of threat actors in the collected dataset. The arc length of the third concentric circle indicates the number of instances the threat actor was involved in an cyber incident in the collected dataset. (zoom in for clarity)[Data available upon request :)]
Fig. 2 provides a summary of the different threat actors involved in cyberattacks employing ransomware to target cloud infrastructure. Among these, ALPHV (BlackCat), is a notorious cyber threat actor, which claimed responsibility for the attacks on the financial firms LoanDepot and Prudential [10] is employing Sphynx encryptor to encrypt targets’ Azure cloud storage. [11] Its partner, Scattered Spider is targeting insurance and financial firms by “leverage SIM swapping to bypass multi-factor authentication” and using phishing and smishing campaigns. Their primary objective is to deploy ransomware in cloud environments, with a particular focus on VMware ESXi (on-premises cloud platform) and Azure platforms. Recently, Storm-0501, a known affiliate of several high-profile R-a-a-S outfits launched a multi-staged approach to compromise hybrid cloud environment and also move laterally from on-premises to cloud environments.[12] This group also uses both commodity and open-source to conduct their operations.
These threat actors have most likely developed or acquired tools for disabling security measures, reconnaissance and persistence maintenance (likely through sync across tenants) [13]. A concerning trend has emerged in the cyber threat landscape: the democratization of ransomware (Ransomware as a service (Raas) for as low as 90 USD)[14] and partnerships among cybercriminal groups. This collaboration has facilitated the sharing of resources and knowledge, making it easier for even less sophisticated actors to target cloud-native environments. One such example is ALPHV partnership with Scattered Spider (or Octo tempest), where the former possesses advanced tools while the latter is likely believed to have good grasp of the functioning and business practices of western companies. [15][16]
3. Vulnerabilities and initial points of access into the cloud
Based on the collected data, the initial access into cloud infrastructure could be classified into three major categories
3.1 Exploiting misconfigured cloud settings and bypassing security measures to deploy ransomware
3.2 Phishing campaigns distributing targeted malware, leading to ransomware on Azure (Dagon Locker)
3.3 Exploiting zero-day vulnerabilities in third-party software to access Azure storage (MOVEit, Shiny Hunters)
Recommendations
Given the versatility and breadth in the TTP’s employed by the threat actors, the defensive mechanisms employed to protect the cloud must be robust. While defending against zero-days still remains arduous, establishing and adopting practices such as “least privilege roles” and “Zero Trust approach” minimizes damage and lateral movement by the threat actor. The number of instances that the lack of the following generic and fundamental recommendations have been used to exploit cloud environments is alarming –
The rapid adoption of cloud services has created numerous interconnections and data transfers, making it difficult to map and maintain visibility of all applications and dependencies. Security teams struggle to identify critical risks amid the noisy attack surface. The distributed nature of cloud environments and the complexity of managing security across multiple clouds and containers increase the attack surface. This raises questions about whether corporations should use cloud services for business-critical data and if the benefits outweigh the potential vulnerabilities and risks.
Acknowledgements
I thank the contributions of my red cell partner Kuang-Yun for her comments and Prof. Sergio for providing the resources to carry out this study. I also thank the anonymous source in a cloud service provider in India for their advice and suggestions.
References
Individual sources mentioned for most cases. But these were identifies using Resecurity, AlienVault and RecordedFuture platforms.
[2] https://www.csis.org/analysis/cyber-operations-during-russo-ukrainian-war
[3] https://www.techrepublic.com/article/google-cloud-security-talks-2023/
[4] https://www.darkreading.com/cyberattacks-data-breaches/russias-apt29-aws-windows-credentials
[5] https://www.gov.il/en/pages/portnoy_cyber_week_24
[8] https://www.wired.com/story/epam-snowflake-ticketmaster-breach-shinyhunters/
[9] https://otx.alienvault.com/pulse/66cdfef5bea27a7ed07baad4
[13] https://app.resecurity.com/incident/index?IncidentSearch[id]=232520
[14] https://app.resecurity.com/search/index?PostSearch%5Bid%5D=1396202442
[15] https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-353a
[17] https://www.idx.us/knowledge-center/alteryx-data-breach-what-you-need-to-know
[18] https://cloud.google.com/blog/topics/threat-intelligence/unc3944-targets-saas-applications/
[20] https://app.resecurity.com/news/index?NewsSearch[id]=4762140
[21] https://thehackernews.com/2024/10/notorious-hacker-group-teamtnt-launches.html
[24] https://dmarcreport.com/blog/hackers-exploiting-google-groups-address/
[25] https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Your presentation is what that bags the prize at the end of the day!
Always remember that your title should not give you away but still should sway your audience. It should be short, crispy, and catchy. People will remember only your topic not your name. It generally bags you the prize in conferences and symposiums. And dont make it too complex and clumpsy.

Always remember that people need to listen to what you say and not watch you PPT. All that your PPT should have are images and tips. Nothing else. There are associated problems of giving away all data in the PPT. Plagiarism is eminent! Look out!
Make the PPT single coloured, I would suggest to use Wood type in Power point. Also try shifting to the google slides, it is better as 3-4 people can work on the same thing at the same time. You can get wonderful templates from slidesgo for both google slides and Powerpoint, surely take a look at that! Try to add some videos or GIFs to make the PPT more interactive!
Always make the PPT animated, yet formal. Try to have charts, flow charts and go with a flow!
Contents > Problem statement > Intro > Brief intro to the prob > Solution > Methods > Results > Future work > cost estimation(if applicable) > Conclusion > Bibliography
The fill function is a rarely used function in the home tab of excel. It can be used to fill the same data in the previous cells in all the selected cells or may also be used to fill the series in the selected cells.
That is, if we need the series of odd numbers, we should select any two members of the series and select the cells until which the numbers are to be filled.


When a series is requires, the series option is selected from the dropdown menu, and the dialgue box as aboe opens.

On clicking “OK”, the values are updated in the selected cells.
For subscript: Type ‘_’ followed by the subscript letters and press spacebar.
For superscript: Type ‘^’ followed by the superscript letters and press spacebar.

Its quite easy and i have tried it out too! Javapipe says:
1. Open the youtube video link in a browser
2. Right click (on the white space) => View the page source. Or for example in Google Chrome, Tools => View Source
3. Find (Ctrl+F) => “og:image”

4. Copy the og:image content url. For Example, “https://i.ytimg.com/vi/9wzk8v4Klsg/maxresdefault.jpg”
5. Open the copied og:image content url in the same browser window
6. Right click on the image and save it to your desktop
I always never knew how to use this feature, though it’s a great and important feature, until I found it out in the page of New Mexico State University. It puts it in a much simple way!

We used collect the RO outlet water in buckets, so as to reuse it for watering plants. But for quite a few days, we forgot to switch buckets and our house gets literally flooded. And image cleaning the mess😥😥!
So I decided to make this device, base on the principles of water flush tank in lavotories 🚽. It’s a simple DIY and costs nothing more than 50 INR.




The figures repesents the working of the flush tank. Once the water level starts to fall after the flush, the ball sinks. This allows the water to enter the tank through the inlet tube. As water level rises, the ball also rises, simultaneously closing the inlet valve. At the critical max height, the water inlet is fully stopped.
Requirements:

The ball is connected to the clip via the straw. The ball floats on the water due to its lower density, that’s why we use a plastic. I used the tack-it to attach to the clip and and the circuitory was made in such a way that the buzzer starts to buzz 📣📢 once the water level reaches the max. The aluminium foil increases the area of contact, thus minimizng the error during operation. Check out this video which explains the working.
If you are having a problem with your wireless mouse, it’s mainly because of the battery. It should have gone dry. If your mouse suddenly becomes unresponsive and turn back again, then you could be sure of it!
Just change the battery and things woulb be as it were! Be sure to use a good battery like energizer or duracell, as they have better battery life and strength!
To insert it to every page you can goto:

2. Goto picture tab and select the picture from your desired locartion.

3.Select the image from the desired location.

4. The image is added to all the pages.

If the image is to be added only to the first alone:

2. Drag the shape to the entire page.


3. Now, goto drawing tools> shape fill> picture and select the picture from your desired location.

4. Image is inserted in one page only.
