Blog
Sharing Mitiga’s latest threat intelligence and research, cloud IR insights, and company news
Ransomware Strikes Azure Storage: Are You Ready?
Heading
There’s been a recent surge in cloud ransomware attacks. Examples of such attacks were observed by Sophos X-Ops, which detected the ransomware group BlackCat/ALPHV using a new Sphinx encryptor variant to encrypt Azure storage accounts by employing stolen Azure Storage account keys. The BlackCat/ALPHV ransomware group is the same entity that claimed responsibility for infiltrating MGM’s infrastructure and encrypting more than 100 ESXi hypervisors.
Deciphering Shadows: Insights and Observations from the MGM Breach
Heading
On September 12, 2023, the world woke up to the news ofanother significant cyber-attack, this time on MGM Resorts International, arenowned name in the hotel and casino industry. The incident affected theiroperations across various locations, including iconic Las Vegas.
A Mindset Shift for Cloud Security Resilience: Assume Breach
Heading
Cloud environments offer tremendous advantages in agility, scalability, and cost efficiency. However, their dynamic nature also introduces new security challenges compared to traditional on-premises IT. To build true resilience for the inevitability of breaches in the cloud, organizations need to shift their mindset and priorities—starting with accepting the assumption that breaches will occur.
Mitiga Security Advisory: Abusing the SSM Agent as a Remote Access Trojan
Heading
Mitiga's research discovered a significant new post-exploitation security concept: involving the use of Systems Manager (SSM) agent as a Remote Access Trojan (RAT) on Linux and Windows machines, controlling them using another AWS account. We shared our research with the AWS security team and included some of their feedback to this advisory.
More on Abusing the Amazon Web Services SSM Agent as a Remote Access Trojan
Heading
Imagine that you’re a SOC (Security Operations Center) analyst receiving an alert about suspicious behavior from a binary on an EC2 instance. After checking the binary on VirusTotal, you find it was an AWS-developed software signed by Amazon. Further investigation reveals that it communicated only with Amazon-owned IP addresses.
Ensuring Compliance with SEC Cyber Disclosure Rules
Heading
The SEC now requires public companies to disclose material cybersecurity incidents within 4 days. Stay informed by reading this article.
Why the Implementation of CIRA is so Important for Incident Response
Heading
Read our article on why Gartner’s CIRA security announcement is pivotal for incident response, driving innovation and improving cloud security strategies.
Mitiga Security Advisory: Lack of Forensic Visibility with the Basic License in Google Drive
Heading
Mitiga's advisory highlights critical gaps in forensic visibility with Google Drive's Basic license, affecting security and incident investigations. Read on.
Think You Have All the Cloud Forensics Data You Need? You Probably Don't
Heading
Logs are everywhere—the digital records of events and actions that have taken place in every hardware system, application and network. All of your digital environments generate a log of some form.