March 29, 2024, 4:11 a.m. | Jens Frie{\ss} (National Research Center for Applied Cybersecurity ATHENE, Technische Universit\"at Darmstadt), Tobias Gattermayer (National Research

cs.CR updates on arXiv.org arxiv.org

arXiv:2403.19368v1 Announce Type: cross
Abstract: Recent works showed that it is feasible to hijack resources on cloud platforms. In such hijacks, attackers can take over released resources that belong to legitimate organizations. It was proposed that adversaries could abuse these resources to carry out attacks against customers of the hijacked services, e.g., through malware distribution. However, to date, no research has confirmed the existence of these attacks. We identify, for the first time, real-life hijacks of cloud resources. This yields …

abuse adversaries arxiv attackers attacks can cloud cloud platforms cs.cr cs.ni customers cyberattacks hijack organizations platforms resources

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Sr. Staff Firmware Engineer – Networking & Firewall

@ Axiado | Bengaluru, India

Compliance Architect / Product Security Sr. Engineer/Expert (f/m/d)

@ SAP | Walldorf, DE, 69190

SAP Security Administrator

@ FARO Technologies | EMEA-Portugal