Cloud Platforms Increasingly Exploited for Malicious Activities, Study Finds

0
cover-image-37875
Spread the love

Cloud platforms are being increasingly utilized for malicious activities, with attackers favoring hybrid setups to evade detection, according to a new study by researchers from the University of Twente. The study, titled “Double-Edged Sword: An Empirical Study on the Contribution of Cloud Providers in Malicious Infrastructure,” highlights a shift in how threat actors use cloud services, revealing growing challenges for internet security and policy frameworks.

Key Findings: Hybrid Cloud Use on the Rise

Side view of unrecognizable hacker in hoodie sitting at white table and working remotely on netbook in light room near wall
Photo by Nikita Belokhonov

The study analyzed DNS data from OpenINTEL, cloud classification from IP2Location, and data on five major cloud providers to track malicious usage patterns. One notable trend is the increased reliance on partial cloud setups—where attackers deploy only specific components, such as web hosting—while avoiding full-stack cloud adoption. This strategy helps obscure operations, reduce dependency on a single provider, and complicates detection. In contrast, fully cloud-based infrastructures for malicious domains have decreased significantly since 2021.

Notably, despite AWS, Google Cloud, and Azure dominating the market share for legitimate domains, malicious actors are distributing their infrastructure more broadly across smaller providers. This diversification dilutes detection capabilities and challenges mitigation efforts due to the lack of centralized controls.

Geographic Insights: Hotspots for Malicious Infrastructure

Wooden tiles spelling 'phishing' highlight cybersecurity themes.
Photo by Markus Winkler

The study also examined the geographic hosting patterns of blocked domains. Countries like China and Russia were found to host a disproportionate concentration of malicious infrastructure relative to the total number of hosted domains. This trend, observed across web hosting, DNS, and email infrastructure, underscores regional vulnerabilities that security professionals must address.

Researchers concluded that differences in national policies, regulatory oversight, and abuse response mechanisms significantly impact the prevalence of malicious activity in these regions.

See also  Emerging Trends in Telecom Markets: A Comprehensive Analysis

Implications for Cloud Providers and Internet Security

Close-up of a laptop displaying cybersecurity text, emphasizing digital security themes.
Photo by cottonbro studio

The findings underline the critical need for cloud providers to enhance their security practices and abuse response mechanisms. Providers’ policies significantly influence whether their platforms host a higher share of malicious domains, even if they don’t dominate the market for blocked domains. Additionally, hybrid cloud usage by malicious actors highlights the need for adaptive detection and mitigation strategies that account for more fragmented, selective infrastructure deployments.

As cloud computing remains vital for a scalable and open internet, the report emphasizes that stronger collaboration between providers, researchers, and policymakers is necessary to reduce the abuse of shared infrastructure.

For further details, read the study: Double-Edged Sword: An Empirical Study on the Contribution of Cloud Providers in Malicious Infrastructure.

Leave a Reply

Your email address will not be published. Required fields are marked *