<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cloud &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/targeted-attacks/cloud/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Tue, 28 Apr 2026 19:23:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>cloud &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>WhatsApp Tests Safer Cloud Backup for Messages</title>
		<link>https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/</link>
					<comments>https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 19:17:49 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CloudBackup]]></category>
		<category><![CDATA[#CloudStorage]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataPrivacy]]></category>
		<category><![CDATA[#EncryptedBackup]]></category>
		<category><![CDATA[#EndToEndEncryption]]></category>
		<category><![CDATA[#MessagingSecurity]]></category>
		<category><![CDATA[#PrivacyProtection]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[#WhatsApp]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11658</guid>

					<description><![CDATA[<p>WhatsApp is developing a new cloud backup system that shifts away from relying entirely on third-party services like</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/">WhatsApp Tests Safer Cloud Backup for Messages</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>WhatsApp is developing a new cloud backup system that shifts away from relying entirely on third-party services like Google Drive and iCloud. The idea is to bring backup storage under its own control, giving users a more secure and dedicated space for their chats, media, and files.</p>



<p>With this approach, users will no longer have to depend on shared cloud storage limits. Instead, WhatsApp aims to provide its own storage environment specifically built for messaging data. This is especially important as chat backups today include large files like high-resolution images, videos, and voice notes, which quickly consume available space.</p>



<p>All data stored in this system will be protected with end-to-end encryption by default. This means that messages remain private, and even WhatsApp itself cannot access the content. By keeping backups encrypted at all times, the platform is aiming to reduce the risk of unauthorized access or data exposure.</p>



<h2 class="wp-block-heading">Enhanced Security with Passkeys</h2>



<p>To strengthen protection further, WhatsApp is planning to introduce passkey-based authentication for backup access. Instead of using traditional passwords or long encryption keys, users will be able to unlock their backups using biometric methods such as fingerprint or facial recognition.</p>



<figure class="wp-block-image size-large is-resized"><img fetchpriority="high" decoding="async" width="1024" height="754" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-1024x754.png" alt="" class="wp-image-11659" style="aspect-ratio:1.3581289218482602;width:798px;height:auto" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-300x221.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-768x566.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-1024x754.png 1024w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-3.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">WhatsApp Backup Storage Limits Overview (Source: WABetaInfo)</figcaption></figure>



<p>This makes the process both simpler and more secure. The authentication is tied directly to the user’s device, which reduces the risk of attacks like phishing, credential theft, or brute-force attempts. The passkey is securely stored and can sync across trusted devices, allowing users to restore backups without needing to remember complex credentials.</p>



<p>At the same time, WhatsApp is expected to keep alternative options available. Users who prefer using passwords or encryption keys will still have that choice, ensuring flexibility for different security preferences.</p>



<h2 class="wp-block-heading">Storage Options and Rollout Plans</h2>



<p>The upcoming system is also expected to introduce dedicated storage plans for backups. Early expectations suggest a small free storage tier for basic use, along with larger paid options for users who need more capacity. This would allow users to manage their backup storage without affecting their personal cloud accounts.</p>



<p>Despite this shift, WhatsApp is likely to continue supporting third-party backups for users who prefer their current setup. This ensures a smoother transition without forcing immediate changes.</p>



<p>The feature is still in development and has not yet been released publicly. It is expected to go through multiple testing phases to ensure stability, security, and compatibility with existing systems before a wider rollout begins.</p>



<p>This move reflects a broader industry trend toward building self-contained ecosystems that prioritize privacy, security, and better control over user data, rather than relying entirely on external platforms.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/">WhatsApp Tests Safer Cloud Backup for Messages</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Infostealers Lead to Cloud Account Compromises</title>
		<link>https://firsthackersnews.com/zestix/</link>
					<comments>https://firsthackersnews.com/zestix/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 06 Jan 2026 07:53:31 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[infostealer]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[access security]]></category>
		<category><![CDATA[account compromise]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[identity security]]></category>
		<category><![CDATA[infostealer malware]]></category>
		<category><![CDATA[leaked credentials]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10924</guid>

					<description><![CDATA[<p>Several large organizations worldwide have been breached after attackers reused stolen login details collected by infostealer malware. How</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zestix/">Infostealers Lead to Cloud Account Compromises</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Several large organizations worldwide have been breached after attackers reused stolen login details collected by <a href="https://firsthackersnews.com/wired/">infostealer malware</a>.</p>



<h2 class="wp-block-heading">How the Attacks Unfolded -Zestix <strong>Infostealer</strong></h2>



<p>Researchers link the activity to a threat actor known as Zestix, also operating under the alias Sentap. The actor accessed cloud storage platforms such as ShareFile, Nextcloud, and OwnCloud, affecting around 50 organizations.</p>



<p>The impacted companies span sectors including aviation, healthcare, finance, defense, and government services. In several cases, attackers were able to access and extract large volumes of sensitive data.</p>



<p>The attacks typically start when employees unknowingly download malicious files that install infostealer malware such as RedLine, Lumma, or Vidar. These programs silently collect saved credentials and browser data from infected systems.</p>



<p>The stolen information is later aggregated into underground databases. The attacker then searches these datasets for corporate cloud credentials and uses them to gain unauthorized access to enterprise environments.</p>



<p>Researchers found that the main weakness was not an advanced exploit, but the lack of multi-factor authentication. Without MFA in place, attackers were able to access systems using only stolen usernames and passwords, some of which had been exposed in infostealer logs for years.</p>



<p>The impact of the breaches is significant. An engineering firm supporting U.S. utilities lost sensitive infrastructure data, while a robotics company exposed defense-related design files.</p>



<p>An airline also saw internal maintenance and safety documents leaked. In another case, health records and personal data tied to Brazilian military personnel were exposed, totaling several terabytes of sensitive information.</p>



<h2 class="wp-block-heading"><strong>How Credentials Are Stolen and Abused</strong></h2>



<p>The attacks follow a simple but effective flow that makes them hard to stop if basic controls are missing.</p>



<ul class="wp-block-list">
<li>An employee downloads what looks like a normal file or software update from email or the web.</li>



<li>An infostealer runs quietly in the background, often blending into legitimate system activity.</li>



<li>The malware collects saved passwords and session data from browsers, password managers, and apps like email or collaboration tools.</li>



<li>The stolen data is encrypted and sent to attacker-controlled servers.</li>



<li>Attackers search through large credential dumps to find logins tied to corporate systems such as cloud storage and business platforms.</li>
</ul>



<p>This method is dangerous because it is cheap, scalable, and easy to repeat. Access to corporate accounts is then sold on underground forums, allowing multiple attackers to reuse the same stolen credentials.</p>



<p>Many organizations were compromised not due to a lack of training, but because multi-factor authentication was not enforced across critical systems.</p>



<p>The fix is simple but urgent: enable MFA everywhere it matters and actively monitor for exposed credentials before they are used by attackers.</p>



<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zestix/">Infostealers Lead to Cloud Account Compromises</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zestix/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cloudflare Reveals Key Technical Causes of Massive Global Outage</title>
		<link>https://firsthackersnews.com/cloudflare-2/</link>
					<comments>https://firsthackersnews.com/cloudflare-2/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 19 Nov 2025 05:28:44 +0000</pubDate>
				<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10658</guid>

					<description><![CDATA[<p>Cloudflare released a detailed report explaining the cause of a major network outage that disrupted global internet traffic</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cloudflare-2/">Cloudflare Reveals Key Technical Causes of Massive Global Outage</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cloudflare released a detailed report explaining the cause of a major network outage that disrupted global internet traffic for several hours. Millions of users and services were affected.</p>



<p>The outage began at 11:20 UTC and was caused by an internal configuration mistake—not a cyberattack—showing that even strong cloud systems can fail.</p>



<p>This event follows similar outages at Azure and AWS, raising concerns about how dependent the world has become on large cloud providers.</p>



<p>Cloudflare’s issue started with a routine permissions update in its ClickHouse database cluster. At 11:05 UTC, the change exposed table metadata in the ‘r0’ database. A Bot Management query didn’t handle this correctly, pulling duplicate columns and creating a feature file twice the normal size.</p>



<p>This file, updated every five minutes to support machine-learning bot detection, exceeded the software’s 200-feature limit. That caused failures in Cloudflare’s core proxy system, FL.</p>



<p>At first, engineers suspected a massive DDoS attack, especially since Cloudflare’s status page was also down. The problem was harder to trace because good and bad files appeared in an alternating pattern during the rollout.</p>



<p>When the Bot Management module failed, request scoring stopped completely. In Cloudflare’s newer FL2 proxy, this resulted in 5xx HTTP errors. Older FL versions defaulted bot scores to zero, which could block real users on sites using strict bot rules.</p>



<p>The outage hit key Cloudflare services. Many websites showed error pages, latency increased, and debugging became difficult. Turnstile CAPTCHA stopped working, blocking logins. Workers KV also had higher error rates, affecting dashboard access and Cloudflare Access authentication.</p>



<p>Email Security briefly lost some spam detection, and configuration updates slowed, though no customer data was compromised. Cloudflare restored full service by 17:06 UTC after stopping the bad files, rolling back to a stable version, and restarting proxies.</p>



<p>Cloudflare’s CEO, Matthew Prince, apologized and called this the company’s worst traffic outage since 2019.</p>



<p>This incident also reflects a broader pattern of configuration-related failures across major cloud providers.</p>



<p>On October 29, 2025, Azure went down globally due to a faulty change in its Front Door CDN, disrupting Microsoft 365, Teams, Xbox, and even airline systems.<br>AWS suffered a 15-hour outage on October 20 in US-East-1 caused by DNS issues in DynamoDB, which affected EC2, S3, Snapchat, and Roblox.<br>Another AWS issue on November 5 slowed Amazon.com checkouts during holiday preparation.</p>



<p>Experts warn these outages show how dangerous it is to rely heavily on centralized cloud services—one mistake can impact the entire internet.</p>



<p>To avoid future problems, Cloudflare is improving its file ingestion process, adding global kill switches, reducing excessive error logging, and reviewing proxy failure behavior.</p>



<p>Although this incident wasn’t caused by an attack, it highlights the need for stronger operational controls as cloud systems continue to grow.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cloudflare-2/">Cloudflare Reveals Key Technical Causes of Massive Global Outage</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cloudflare-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>“Jingle Thief” Cybercrime Group Targets Cloud Gift Card Systems in Retail Sector</title>
		<link>https://firsthackersnews.com/jingle-thief-cloud-gift-card-fraud/</link>
					<comments>https://firsthackersnews.com/jingle-thief-cloud-gift-card-fraud/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 23 Oct 2025 11:52:44 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#Cybercrime]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#GiftCardFraud]]></category>
		<category><![CDATA[#Microsoft365Security]]></category>
		<category><![CDATA[#PaloAltoNetworks]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#RetailSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10550</guid>

					<description><![CDATA[<p>Cybersecurity researchers have uncovered a sophisticated cybercriminal operation dubbed “Jingle Thief,” which has been targeting cloud environments linked</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/jingle-thief-cloud-gift-card-fraud/">“Jingle Thief” Cybercrime Group Targets Cloud Gift Card Systems in Retail Sector</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity researchers have uncovered a sophisticated cybercriminal operation dubbed <strong>“Jingle Thief,”</strong> which has been targeting cloud environments linked to retail and consumer service organizations to carry out large-scale <strong>gift card fraud.</strong></p>



<p>According to a new analysis by <strong>Palo Alto Networks Unit 42</strong> researchers <strong>Stav Setty</strong> and <strong>Shachar Roitman</strong>, the attackers use <strong>phishing and smishing campaigns</strong> to steal employee credentials from companies that issue or manage gift cards. Once inside, they escalate privileges and issue unauthorized cards for financial gain — often reselling them on <strong>gray markets</strong>.</p>



<p>Gift cards remain a preferred target for cybercriminals due to their <strong>ease of redemption</strong>, <strong>anonymity</strong>, and <strong>traceability challenges</strong>, making such fraud difficult to investigate.</p>



<h2 class="wp-block-heading"><strong>A Seasonal Threat with Long-Term Persistence</strong></h2>



<p>The group’s name, <em>Jingle Thief</em>, stems from its pattern of ramping up fraud campaigns around <strong>holiday and festive seasons</strong>, when gift card transactions surge. Palo Alto Networks tracks the operation internally under the identifier <strong>CL-CRI-1032</strong>, with “CL” representing cluster and “CRI” indicating criminal motivation.</p>



<p>Researchers have <strong>linked Jingle Thief with moderate confidence</strong> to financially motivated actors <strong>Atlas Lion</strong> and <strong>Storm-0539</strong>, groups previously associated with operations traced back to <strong>Morocco</strong>. The threat cluster is believed to have been active since <strong>late 2021</strong>.</p>



<p>One of the most concerning traits of Jingle Thief is its <strong>long-term persistence</strong> within compromised environments — in some cases, maintaining access for <strong>over a year</strong>. During this period, attackers conduct <strong>extensive reconnaissance</strong>, map cloud infrastructures, move laterally, and implement methods to avoid detection.</p>



<h2 class="wp-block-heading"><strong>Recent Global Campaigns</strong></h2>



<p>Unit 42 reported a surge in coordinated Jingle Thief campaigns between <strong>April and May 2025</strong>, targeting multiple global enterprises. In one notable incident, the attackers compromised <strong>60 user accounts</strong> within a single organization and maintained access for <strong>approximately 10 months</strong>.</p>



<p>By exploiting stolen credentials, Jingle Thief operators <strong>impersonate legitimate users</strong> to infiltrate <strong>Microsoft 365</strong> environments, steal sensitive data, and execute <strong>high-value gift card fraud</strong> at scale. They also modify <strong>log settings</strong> and <strong>forensic trails</strong> to conceal unauthorized issuance activities.</p>



<h2 class="wp-block-heading"><strong>Phishing Tactics and Cloud Abuse</strong></h2>



<p>The group employs highly tailored phishing pages mimicking <strong>Microsoft 365 login portals</strong>, distributed via <strong>email or SMS</strong>, to harvest credentials. Once credentials are obtained, the attackers perform a <strong>second round of reconnaissance</strong> inside the organization, focusing on <strong>SharePoint</strong>, <strong>OneDrive</strong>, and internal documentation.</p>



<p>Targets include:</p>



<ul class="wp-block-list">
<li>Gift card issuance workflows</li>



<li>VPN configuration guides</li>



<li>Access credentials for Citrix or cloud systems</li>



<li>Financial process documentation</li>
</ul>



<p>Jingle Thief further <strong>leverages compromised accounts</strong> to send <strong>internal phishing emails</strong>, often disguised as <strong>IT service notifications</strong> or <strong>ticketing updates</strong>, exploiting the trust of corporate communication systems.</p>



<p>To maintain persistence, the group creates <strong>malicious inbox rules</strong> to forward emails, deletes sent messages, and even registers <strong>rogue authenticator apps</strong> to bypass <strong>multi-factor authentication (MFA)</strong>. In some cases, attackers <strong>enroll their own devices in Entra ID</strong>, ensuring continued access even after password resets.</p>



<p>Unlike many threat actors that deploy custom malware, Jingle Thief relies heavily on <strong>identity misuse</strong> and <strong>cloud-native exploitation techniques</strong>. This stealthy approach allows them to <strong>blend in with legitimate activity</strong> and <strong>evade detection tools</strong> focused on endpoint-based threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/jingle-thief-cloud-gift-card-fraud/">“Jingle Thief” Cybercrime Group Targets Cloud Gift Card Systems in Retail Sector</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/jingle-thief-cloud-gift-card-fraud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Warns Silk Typhoon Hackers Target IT Supply Chain via Cloud</title>
		<link>https://firsthackersnews.com/microsoft-says-silk-typhoon/</link>
					<comments>https://firsthackersnews.com/microsoft-says-silk-typhoon/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 06 Mar 2025 18:03:07 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[credential abuse]]></category>
		<category><![CDATA[mcirosoft]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Supply Chain Attacks]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9752</guid>

					<description><![CDATA[<p>Microsoft says Silk Typhoon is now targeting remote management tools and cloud apps for access, showing a wide</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-says-silk-typhoon/">Microsoft Warns Silk Typhoon Hackers Target IT Supply Chain via Cloud</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft says Silk Typhoon is now targeting remote management tools and cloud apps for access, showing a wide and fast exploitation strategy.</p>



<p>Since late 2024, Silk Typhoon has been using stolen API keys and credentials from privilege access management (PAM), cloud app providers, and cloud data companies.</p>



<p>This lets them access customer environments of the compromised companies.</p>



<p>They’ve also gained access through password spray attacks and by finding leaked corporate passwords in public repositories.</p>



<h2 class="wp-block-heading"><strong>Supply Chain Attacks and Credential Abuse</strong></h2>



<p>Silk Typhoon targets many industries worldwide, including IT services, healthcare, legal, education, defense, government, NGOs, and energy. Most of their attacks focus on the United States but also happen globally.</p>



<p>They are skilled at working with cloud environments, which helps them move between systems, stay hidden, and steal data quickly.</p>



<p>Since 2020, Silk Typhoon has used different web shells to run commands, stay in networks, and steal data.</p>



<p>Recently, Silk Typhoon used stolen API keys to access downstream customers, gather data, and run recon with admin accounts.</p>



<p>They also reset admin accounts, planted web shells, created new users, and cleared activity logs.</p>



<p>Microsoft notified affected customers to help secure their systems.</p>



<h2 class="wp-block-heading"><strong>Recommended Actions:</strong></h2>



<ul class="wp-block-list">
<li>Review Entra Connect server logs for any suspicious activity.</li>



<li>Check newly created applications to ensure they are legitimate.</li>



<li>Monitor multi-tenant applications, especially for any unexpected changes.</li>



<li>Investigate any Microsoft Graph or eDiscovery activity, especially involving SharePoint or email data access — these are common targets for Silk Typhoon.</li>
</ul>



<h2 class="wp-block-heading"><strong>Stronger Defenses:</strong></h2>



<ul class="wp-block-list">
<li>Make sure all public-facing devices are fully patched to prevent known exploits.</li>



<li>Apply strict controls and monitoring on all important accounts, especially privileged accounts.</li>



<li>Focus on credential hygiene, such as removing unused accounts, enforcing strong passwords, and applying least privilege access to limit damage if an account is compromised.</li>



<li>Set up Conditional Access policies to enforce Zero Trust principles — requiring users to verify their identity before accessing critical systems.</li>



<li>Enable risk-based sign-in protection, so suspicious logins (like from unusual locations or devices) trigger extra security checks.</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-says-silk-typhoon/">Microsoft Warns Silk Typhoon Hackers Target IT Supply Chain via Cloud</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-says-silk-typhoon/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Amazon GuardDuty Gains AI/ML Threat Detection for Cloud Security</title>
		<link>https://firsthackersnews.com/amazon-guardduty/</link>
					<comments>https://firsthackersnews.com/amazon-guardduty/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 02 Dec 2024 17:06:36 +0000</pubDate>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Amazon GuardDuty]]></category>
		<category><![CDATA[AWS's cloud]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9162</guid>

					<description><![CDATA[<p>Amazon has improved cloud security with AI/ML threat detection in GuardDuty. This new feature enhances threat detection by</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/amazon-guardduty/">Amazon GuardDuty Gains AI/ML Threat Detection for Cloud Security</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Amazon has improved cloud security with AI/ML threat detection in GuardDuty. This new feature enhances threat detection by using AWS&#8217;s cloud visibility and scale to better protect applications, workloads, and data.</p>



<p>Modern cloud environments and evolving security threats create major challenges for organizations. Security teams struggle to manage the high volume of events, making it harder to detect and respond to threats quickly.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="846" height="1024" src="https://firsthackersnews.com/wp-content/uploads/2024/12/image-846x1024.png" alt="" class="wp-image-9163" srcset="https://firsthackersnews.com/wp-content/uploads/2024/12/image-200x242.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/12/image-248x300.png 248w, https://firsthackersnews.com/wp-content/uploads/2024/12/image-400x484.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/12/image-600x726.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/12/image-768x930.png 768w, https://firsthackersnews.com/wp-content/uploads/2024/12/image-800x969.png 800w, https://firsthackersnews.com/wp-content/uploads/2024/12/image-846x1024.png 846w, https://firsthackersnews.com/wp-content/uploads/2024/12/image.png 1068w" sizes="(max-width: 846px) 100vw, 846px" /><figcaption class="wp-element-caption">Amazon GuardDuty tool</figcaption></figure>



<p>The complexity is increased because many attacks unfold in multiple stages, making it critical for security solutions to identify these stages as part of a larger attack pattern. To address this, Amazon has upgraded GuardDuty with advanced AI and machine learning features. </p>



<p>These enhancements allow GuardDuty to detect not only known attack types but also new, previously unseen attack sequences. By recognizing related activities across time, security teams can quickly identify potential threats and prevent larger attacks before they can cause significant damage to systems and data.</p>



<p>GuardDuty’s enhanced threat detection uses advanced AI/ML models to identify complex attack sequences in AWS. These sequences may include actions like privilege discovery, API manipulation, and data exfiltration. </p>



<p>The update introduces a new high-severity finding level for more urgent threats and improves existing detections, making them easier to act on.</p>



<p>The system now offers composite detections that cover multiple data sources, timeframes, and resources in an account, giving a better view of complex cloud attacks and improving response efforts. GuardDuty’s enhanced capabilities work smoothly with existing security workflows. </p>



<p>Users can access these new AI/ML features through the Amazon GuardDuty console, where additional widgets appear on the Summary page.</p>



<p>The widgets show an overview of detected attack sequences and allow users to sort findings by severity for easier threat investigation. </p>



<p>Each finding includes a summary of the threat, linked to tactics from the MITRE ATT&amp;CK® framework, and provides remediation recommendations based on AWS best practices. The enhanced detection is enabled by default, with no extra cost beyond the standard GuardDuty fees.</p>



<p>The new features integrate with Amazon GuardDuty workflows, including AWS Security Hub and third-party systems. It recommends activating S3 Protection to detect data risks with S3 buckets.</p>



<p>With AI/ML-driven detection, GuardDuty improves cloud security by providing deeper, actionable insights and automating the detection of complex threats, helping organizations strengthen their security.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/amazon-guardduty/">Amazon GuardDuty Gains AI/ML Threat Detection for Cloud Security</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/amazon-guardduty/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New AlienFox toolkit steals credentials for 18 cloud services</title>
		<link>https://firsthackersnews.com/alienfox-steals-credentials/</link>
					<comments>https://firsthackersnews.com/alienfox-steals-credentials/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 03 Apr 2023 16:41:44 +0000</pubDate>
				<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[AlienFox]]></category>
		<category><![CDATA[cloud services]]></category>
		<category><![CDATA[cre]]></category>
		<category><![CDATA[framework]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[steals data]]></category>
		<category><![CDATA[toolkit]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=6222</guid>

					<description><![CDATA[<p>A recently discovered comprehensive toolset dubbed AlienFox toolkit is circulating on Telegram.&#160; It’s a modular set of tools</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/alienfox-steals-credentials/">New AlienFox toolkit steals credentials for 18 cloud services</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A recently discovered comprehensive toolset dubbed AlienFox toolkit is circulating on Telegram.&nbsp;</p>



<p>It’s a modular set of tools that enables malicious actors to scan for poorly configured servers, potentially leading to the theft of cloud-based email service credentials and authentication secrets.</p>



<p>According to SentinelLabs research on AlienFox, this powerful toolkit aims to fix popular misconfigurations in widely used online hosting frameworks such as Drupal, Opencart, WordPress, Magento and Prestashop among many others. Targeted services also include Laravel and&nbsp;Joomla.</p>



<p>Here below, we have mentioned all the hosting frameworks that AlienFox targets:-</p>



<ul class="wp-block-list"><li>Laravel</li><li>Drupal</li><li>Joomla</li><li>Magento</li><li>Opencart</li><li>Prestashop</li><li>WordPress</li></ul>



<h2 class="wp-block-heading"><strong>Identified versions of AlienFox</strong></h2>



<p>All the versions of AlienFox that the security analysts identify:-</p>



<ul class="wp-block-list"><li>AlienFox V2</li><li>AlienFox V3.x</li><li>AlienFoxV4</li></ul>



<p>AlienFox then uses data extraction scripts to explore misconfigured servers and locate sensitive configuration files, which are often used to store secrets such as API keys, account credentials, and authentication tokens.</p>



<p>Using security scanning platforms, malicious actors employ AlienFox to obtain inventories of poorly configured cloud endpoints from sources including:-</p>



<ul class="wp-block-list"><li>LeakIX</li><li>SecurityTrails</li></ul>



<p>Secondly, AlienFox retrieves sensitive configuration files that generally store sensitive data from misconfigured servers using data-extraction scripts, including:-</p>



<ul class="wp-block-list"><li>API keys</li><li>Account credentials</li><li>Authentication tokens</li></ul>



<p>More specifically, the third version of the kit introduced better performance, now with initialization variables, Python classes with modular functions and process threading.</p>



<p>The latest version of AlienFox is v4, which has better code and script organization and extended targeting range.</p>



<p><strong>Recommendation</strong></p>



<ul class="wp-block-list"><li>The administrators must ensure that the access control settings of their servers are set accordingly.</li><li>Ensure that the file permissions on their server are set properly.</li><li>Remove any unnecessary services that are running on your server.</li><li>Make sure to enable multi-factor authentication.</li><li>Ensure that any activity on your accounts that seems unusual or suspicious is closely monitored.</li></ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/alienfox-steals-credentials/">New AlienFox toolkit steals credentials for 18 cloud services</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/alienfox-steals-credentials/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
