Threat actors are actively modifying their TTPs to counter the advanced security mechanisms and tools to accomplish their illicit goals for several malicious purposes.
Hiding malicious traffic on cloud storage platforms is not an entirely new concept, and threat actors are shifting toward this concept.
Security researchers at Insikt recently identified that hackers actively exploit popular and trusted cloud platforms to hide malicious traffic.
This strategy boosts data theft efficiency and weakens the security mechanisms and defense implemented. In the case of exploitation of this approach, the APT groups take the lead, and the less advanced groups take the second lead.
This type of exploitation by hackers shows how robust, adaptable defense strategies and security mechanisms are needed to mitigate such evolving attacks.
In the report shared with Cyber Security News, researchers noted that limited reporting delays the exact trend analysis. However, the following key things suggest a rising trend in LIS abuse:-
Besides this, shifting threat tactics reduce the IOC blocking and efficacy of the basic detections. But, the solution for an effective defense system, the following things have to be performed:-
Security analysts analyzed more than 400 malware families, and they identified the following data:-
Most abused cloud platforms:-
Most abused messaging apps:-
For robust defense, properly learning about all the legitimate and malicious service usage is one of the key factors for comprehensive detection and security.
Here below, we have mentioned all the provided recommendations:-
Keep informed about the latest Cyber Security News by following us on Google News, Linkedin, Twitter, and Facebook.
Cybersecurity analysts have uncovered a sophisticated campaign exploiting a fake Zoom installer to deliver BlackSuit…
Nitrux Linux, renowned for its innovative approach to desktop computing, has unveiled its latest release, Nitrux…
Cybersecurity experts at the AhnLab Security Intelligence Center (ASEC) have uncovered a novel phishing malware…
A newly disclosed authentication bypass vulnerability (CVE-2025-2825) in CrushFTP file transfer software enables attackers to…
A newly identified Android malware, dubbed TsarBot, has emerged as a potent cyber threat targeting…
A critical remote code execution (RCE) vulnerability, tracked as CVE-2025-24813, is being actively exploited in…