March 29, 2024, 4:11 a.m. | Jens Frie{\ss} (National Research Center for Applied Cybersecurity ATHENE, Technische Universit\"at Darmstadt), Tobias Gattermayer (National Research

cs.CR updates on arXiv.org arxiv.org

arXiv:2403.19368v1 Announce Type: cross
Abstract: Recent works showed that it is feasible to hijack resources on cloud platforms. In such hijacks, attackers can take over released resources that belong to legitimate organizations. It was proposed that adversaries could abuse these resources to carry out attacks against customers of the hijacked services, e.g., through malware distribution. However, to date, no research has confirmed the existence of these attacks. We identify, for the first time, real-life hijacks of cloud resources. This yields …

abuse adversaries arxiv attackers attacks can cloud cloud platforms cs.cr cs.ni customers cyberattacks hijack organizations platforms resources

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior InfoSec Manager - Risk and Compliance

@ Federal Reserve System | Remote - Virginia

Security Analyst

@ Fortra | Mexico

Incident Responder

@ Babcock | Chester, GB, CH1 6ER

Vulnerability, Access & Inclusion Lead

@ Monzo | Cardiff, London or Remote (UK)

Information Security Analyst

@ Unissant | MD, USA