{"id":162967,"date":"2022-06-06T13:45:23","date_gmt":"2022-06-06T20:45:23","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=162967"},"modified":"2022-06-15T13:40:38","modified_gmt":"2022-06-15T20:40:38","slug":"cloud-threat-actors","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2022\/06\/cloud-threat-actors\/","title":{"rendered":"Containers, Assemble: What Cloud Threat Actors Don\u2019t Want You to Know"},"content":{"rendered":"<p>It\u2019s like the snap of a familiar set of fingers wearing the gauntlet embedded with infinity stones. One moment, your cloud environment is untouched, containers, apps and data all right where they should be. The next, someone else is in control of what still exists and how it\u2019s going to be used.<\/p>\n<p>While it might sound dramatic to compare threat actors infiltrating your cloud environment to Thanos from the Marvel Cinematic Universe snapping his fingers to wipe out half of the universe, what both scenarios have in common is someone else deciding your fate. In a business setting, just like in the Marvel movies, this can have <a href=\"https:\/\/unit42.paloaltonetworks.com\/apache-log4j-vulnerability-cve-2021-44228\/\">ripple-effect consequences that can be threatening to your organization<\/a> and the rest of the world. No matter how small or large an organization\u2019s cloud footprint may be, the more that attackers realize what\u2019s possible in a cloud environment, the bolder they become \u2013 and the more dangerous to our interconnected world.<\/p>\n<p>Now, all hope is not lost. It\u2019s not as if we just let Thanos live in the Garden peacefully (in other words, walking away without consequences). While we can\u2019t rewind time by taking the infinity stones for ourselves, we can change our approach to cloud security with a prevention-first security strategy.<\/p>\n<p>&nbsp;<\/p>\n<h2><\/h2>\n<h2>First Things First: Learn Who Targets Cloud Native Infrastructure<\/h2>\n<p>Malicious actors who threaten your organization\u2019s cybersecurity have historically done so by compromising systems and devices within an organization\u2019s physical location. With the rise of hosting infrastructure within cloud service platforms (CSPs) and cloud native container platforms, attackers are modifying their tactics, techniques and procedures (TTPs) in order to compromise cloud infrastructure.<\/p>\n<p>As a result, a new classification of threat actors has emerged, labeled by Unit 42 as \u201ccloud threat actors.\u201d Unit 42 defines a cloud threat actor as <em>an individual or group posing a threat to organizations through directed and sustained access to their cloud platform resources, services or embedded metadata<\/em>.<\/p>\n<p>While cloud threat actors follow the same overall operational workflow as traditional threat actors, cloud threat actors have evolved their TTPs to a level of sophistication that enables them to potentially modify, create or delete cloud environment resources. Let\u2019s dive into some of the details of who these cloud threat actors are and what they have in common with each other.<\/p>\n<p>&nbsp;<\/p>\n<h2><\/h2>\n<h2>Unit 42\u2019s Industry-First Cloud Threat Actor Index<\/h2>\n<p>To assist in defending against the growing threat of cloud threat actors, Unit 42 researchers created an industry-first Cloud Threat Actor Index, which charts the specific operations performed by threat groups who target cloud infrastructure.<\/p>\n<p>The data found in the Cloud Threat Actor Index follows the <a href=\"https:\/\/attack.mitre.org\/matrices\/enterprise\/cloud\/\" rel=\"nofollow,noopener\" >MITRE ATT&amp;CK\u00ae cloud<\/a> and <a href=\"https:\/\/attack.mitre.org\/matrices\/enterprise\/containers\/\" rel=\"nofollow,noopener\" >container<\/a> matrices, giving security professionals a common framework around which to communicate and discuss the TTPs employed by these threat actors. The Cloud Threat Actor Index also employs the <a href=\"https:\/\/unit42.paloaltonetworks.com\/atoms\/\">Unit 42 ATOM<\/a> service to provide security professionals with all of the known indicators of compromise (IoCs) used by the cloud threat actors packaged within the industry standard STIX\/TAXII format. This format allows for easy integration with cloud security tools and platforms.<\/p>\n<p>The groups highlighted in the Cloud Threat Actor Index all directly target cloud service platforms. Going a step further, once they bypass traditional security defenses, they are able to gain an initial foothold within the compromised organization\u2019s cloud infrastructure.<\/p>\n<p>In the following section, we will explore one of the top five cloud threat actors targeting the cloud (this cloud threat actor can also be found in the index). We will then follow that example by explaining how these groups could be prevented from being able to execute at least two of their TTPs.<\/p>\n<p>&nbsp;<\/p>\n<h2><\/h2>\n<h2><a id=\"post-162967-_t6d524qbultp\"><\/a>WatchDog: The Stealer<\/h2>\n<p>A description of <a href=\"https:\/\/unit42.paloaltonetworks.com\/atoms\/watchdog\/\">WatchDog<\/a> and their TTPs from the Cloud Threat Actor Index can be found below:<\/p>\n<p>\u201cWatchDog is a cloud-focused threat group that has a history of <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/threat-brief-browser-cryptocurrency-mining\">cryptojacking<\/a> operations as well as cloud service platform credential scraping. They were first known to operate on Jan. 27, 2019. They use a variety of custom-built Go Scripts as well as repurposed cryptojacking scripts from other groups, including TeamTNT. They are currently considered to be an opportunistic threat group that targets exposed cloud instances and applications.\u201d<\/p>\n<figure id=\"attachment_162981\" aria-describedby=\"caption-attachment-162981\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:57.22%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-162981 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/06\/word-image-12.png\" alt=\"WatchDog Cloud Threat Actor TTPs charted in Unit 42\u2019s Cloud Threat Report, Volume 6. Chart includes TTPs related to execution, privilege escalation, defense evasion, credential access and discovery. Red backgrounds denote TTPs specific to cloud platforms, whereas the green background denotes TTPs that are container-platform specific. TTPs in red font denote operations that can lead to the wider compromise of cloud infrastructure.\" width=\"900\" height=\"515\" \/><\/span><\/div><figcaption id=\"caption-attachment-162981\" class=\"wp-caption-text\">Figure 1. WatchDog Cloud Threat Actor TTPs charted in Unit 42\u2019s Cloud Threat Report, Volume 6.<\/figcaption><\/figure>\n<p>In the chart above, the red background denotes TTPs specific to cloud platforms, whereas the green background denotes TTPs that are container-platform specific. TTPs in red font denote operations that can lead to the wider compromise of cloud infrastructure.<\/p>\n<p>As shown in the chart, there are several TTPs WatchDog employs that are container-specific and even allow for the possibility of <a href=\"https:\/\/unit42.paloaltonetworks.com\/siloscape\/\">container escape<\/a>. Interestingly, these techniques can occur across any stage of the operational workflow \u2013 from execution all the way through to discovery.<\/p>\n<p>&nbsp;<\/p>\n<h2><\/h2>\n<h2>Container Security: The Iron Man to a Modern Thanos<\/h2>\n<p>Dr. Strange only saw one possible outcome to defeating Thanos once and for all, which involved Iron Man sacrificing his own life; similarly we see one way (and only one) to ensure that cloud threat actors are unable to perform container-specific and container escape\/resource-specific TTPs. And that one way would be through container security. Luckily, proper container security can be achieved through best practices \u2013 no heroes need sacrifice their lives.<\/p>\n<p>By ensuring that your organization has purpose-built security that addresses vulnerability management, compliance, runtime protection and network security requirements for containerized applications, you are putting into place a prevention strategy that keeps you protected all the way from build to runtime and everything in between.<\/p>\n<p>If you\u2019re curious what to look for, this informational article provides insight into what a <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/prisma-cloud\/what-is-container-scanning-a-top-requirement-for-container-security\/\">full lifecycle container security solution<\/a> should have.<\/p>\n<p>&nbsp;<\/p>\n<h2><\/h2>\n<h2>Why You Need a Cloud Native Application Protection Platform (Cue the Avengers Theme Song)<\/h2>\n<p>So Dr. Strange and Iron Man have helped make sure your containers can\u2019t be targeted by Thanos, but what about all those other TTPs just waiting to be put to malicious use to infiltrate your cloud infrastructure some other way? That\u2019s where the rest of the Avengers come in, and we all know that the team together is more powerful than any hero working alone.<\/p>\n<p>When all the Marvel heroes work together: from Dr. Strange and Iron Man, to Captain America and Spider Man, to Black Widow and Hawkeye and the rest of the Avengers, Thanos doesn\u2019t stand a chance. In the same way, when your organization deploys full lifecycle cloud security, neither does WatchDog or <a href=\"https:\/\/unit42.paloaltonetworks.com\/category\/cloud\/\">any other cloud threat actor<\/a>.<\/p>\n<p>For that reason, it is essential to assemble your own arsenal of defenses against these cloud threat actor groups, who are looking for any way to infiltrate your organization and take control of it. The best way to do that would be to employ a <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/prisma-cloud\/get-to-know-cloud-native-application-protection-platforms\/\">cloud native application protection platform (CNAPP)<\/a>.<\/p>\n<p>With a CNAPP, you have the equivalent of every infinity stone and Avenger on your side: cloud code security, cloud security posture management (CSPM), cloud workload protection (CWPP), cloud network security (CNS) and cloud identity security. Sure, all of these capabilities are powerful on their own, but when your organization brings them together, cloud threat actors will be rendered powerless.<\/p>\n<p>&nbsp;<\/p>\n<h2><\/h2>\n<h2>Get Your Copy of Unit 42\u2019s Cloud Threat Actor Index<\/h2>\n<p>In Unit 42\u2019s latest Cloud Threat Report, \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/unit42-cloud-threat-research-volume-six\">IAM The First Line of Defense<\/a>,\u201d cloud threat researchers provide five cloud threat actor TTPs charts. They also dive into how proper identity and access management can be your first line of defense in protecting against being targeted by cloud threat actors. Finally, Unit 42 researchers provide in-depth recommendations for getting started on protecting your organization today, including how to deploy CNAPP suite integration, how to harden IAM permissions and how to increase security automation.<\/p>\n<p><a href=\"https:\/\/start.paloaltonetworks.com\/unit-42-cloud-threat-report-volume-6.html\">Download the Unit 42 Cloud Threat Report, Volume 6, now<\/a> and learn how you can get started with implementing a Cloud Native Application Protection Platform that combines key defenses like a team of heroes and keeps your organization secure from code to cloud.<\/p>\n<p>P.S. Want to learn about the research and recommendations directly from the experts? Watch our\u00a0<a class=\"c-link\" tabindex=\"-1\" href=\"https:\/\/www.linkedin.com\/video\/live\/urn:li:activity:6942853103457112064\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.linkedin.com\/video\/live\/urn:li:activity:6942853103457112064\/\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">LinkedIn Live event<\/a>\u00a0on-demand now!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud Threat Actors target cloud environments \u2013 learn how your organization can combine cloud security defenses to stop them.<\/p>\n","protected":false},"author":711,"featured_media":162968,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6724],"tags":[7311,7093,2623,586],"coauthors":[7514],"class_list":["post-162967","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-points-of-view","tag-cloud-threat-report","tag-cnapp","tag-threat-research","tag-unit-42","cloud_sec_category-cloud-infrastructure-entitlement-management","cloud_sec_category-cloud-native-application-platform","cloud_sec_category-cloud-workload-protection-platform"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/06\/Collaborate-2.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/162967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/711"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=162967"}],"version-history":[{"count":5,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/162967\/revisions"}],"predecessor-version":[{"id":163666,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/162967\/revisions\/163666"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/162968"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=162967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=162967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=162967"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=162967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}