Latest from the Labs
Explore the latest discoveries, deep dives, and technical how-tos from the Mitiga Labs team. Our research is dedicated to informing defenders and disrupting attackers.
Automating AWS Infrastructure Creation with Crossplane and GitOps
Heading
A while back, I started migrating my CD to a full GitOps process.
Tactical Guide to Threat Hunting in Snowflake Environments
Heading
It was brought to our attention that a threat actor has been observed using stolen customer credentials to target organizations utilizing Snowflake databases.
Who Touched My GCP Project? Understanding the Principal Part in Cloud Audit Logs – Part 1
Heading
Google Cloud Platform (GCP) continues to expand its offerings and remains a top-tier cloud infrastructure service provider. It offers a wide range of services, including Compute Engine (VMs), Google Kubernetes Engine (GKE), BigQuery, Cloud Storage, and Cloud AI Platform. However, in recent years, several vulnerabilities have been reported in some of GCP's services, such as privilege escalation in GKE and CloudSQL.
Why Did AWS Replace My Role’s ARN with a Unique ID in My Policy?
Heading
Understand why AWS replaced your role's ARN with a unique ID in your policy and learn how it affects your IAM management and cloud security practices.
Microsoft Breach by Midnight Blizzard (APT29): What Happened?
Heading
Understand the Midnight Blizzard Microsoft breach by APT29, what happened, and key steps organizations should take to strengthen their defenses.
Understanding GitLab's Security Threats and Strengthening Your Preparedness
Heading
GitLab, a cloud-based, open-source Git repository used by over 38,000 companies around the globe, plays a pivotal role in modern software development. For the organizations that rely on it, it’s a vital collaboration tool and innovation enabler, allowing developers to swiftly test, monitor, and deploy code and housing the full CI/CD pipeline.
How AWS EKS Pod Identity Feature Enhances Credential Management
Heading
This past week at re:Invent, AWS announced a very cool new product feature: EKS Pod Identity. As an AWS user, and specifically an EKS (Elastic Kubernetes Service) user, I spend a great deal of time connecting my pods and workloads to other AWS services and clusters in other regions and accounts, so for me, this feature arrives just in time.
Ransomware Strikes Azure Storage: Are You Ready?
Heading
There’s been a recent surge in cloud ransomware attacks. Examples of such attacks were observed by Sophos X-Ops, which detected the ransomware group BlackCat/ALPHV using a new Sphinx encryptor variant to encrypt Azure storage accounts by employing stolen Azure Storage account keys. The BlackCat/ALPHV ransomware group is the same entity that claimed responsibility for infiltrating MGM’s infrastructure and encrypting more than 100 ESXi hypervisors.
Mitiga Security Advisory: Abusing the SSM Agent as a Remote Access Trojan
Heading
Mitiga's research discovered a significant new post-exploitation security concept: involving the use of Systems Manager (SSM) agent as a Remote Access Trojan (RAT) on Linux and Windows machines, controlling them using another AWS account. We shared our research with the AWS security team and included some of their feedback to this advisory.