Ransomware

US-Based Hybrid Clouds Subjected to Storm-0501 Attacks

Share

U.S. organizations, including those in the government, law enforcement, manufacturing, and transportation sectors, had their hybrid cloud environments targeted by the Storm-0501 ransomware-as-a-service operation for subsequent lateral movement, data and credential exfiltration, and ransomware deployment activities, reports SC Media.

After exploiting compromised devices' admin privileges, Storm-0501 proceeds to leverage other tools, including Impacket's SecretsDump module, to obtain additional credentials and non-human identities that it could use to breach other devices across the network, according to an analysis from Microsoft Threat Intelligence.

Such a development should prompt organizations to bolster NHI visibility and contextualization within their cloud environments, noted Entro Security co-founder and CEO Itzik Alvas. Organizations' security teams have also been urged by Keeper Security Vice President of Security and Architecture Patrick Tiquet to bolster credentials as part of a zero-trust strategy.

"Security teams should prioritize strengthening password policies by enforcing strong, unique credentials for every account and implementing multi-factor authentication across all systems," Tiquet added.

US-Based Hybrid Clouds Subjected to Storm-0501 Attacks

Hybrid clouds are vulnerable to Storm-0501 ransomware-as-a-service attacks.