Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 93122 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

"Cloud" abuse by the dark side...


  • Please log in to reply
No replies to this topic

#1 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 14 November 2009 - 07:19 AM

FYI...

"Cloud" abuse by the dark side...
- http://cloudsecurity...-the-dark-side/
Nov 10, 2009 - "The public cloud holds tremendous possibilities for goodness in lowering computing costs and increasing flexibility, but the dark side of the world is always ready to take advantage of cloud delivery models like Platform-as-a-Service (PaaS). Arbor Networks recently spotted* a Google AppEngine Platform-as-a-Service application being used for Command and Control (CnC) for a botnet... Google promptly took down the application, but the event raises some interesting issues... It does not take a fertile imagination to see bad guys going from using PaaS to manage their malware to applying knowledge to go after IaaS applications..."
* http://asert.arborne...-used-as-a-cnc/
November 9, 2009 - "... the site hosting the second stage malware has been contacted for takedown, as well.
UPDATE Google has confirmed the malicious AppEngine is now down..."

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove

Related Topics



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users