• Home
  • About Us
  • Privacy Policy
  • Contact Us
  • Disclaimer
  • Terms & Conditions
Journal Official
Advertisement
  • Home
  • Tech
    • All
    • Apps
    • Gadgets
    Google’s CFO just got promoted

    Google’s CFO just got promoted

    How Google’s latest AI model is generating music from your brain activity

    How Google’s latest AI model is generating music from your brain activity

    Easy Rider to Midnight Run, The Greatest Roadtrips Movies of All Time

    Easy Rider to Midnight Run, The Greatest Roadtrips Movies of All Time

    Three new Starfield animated shorts offer more glimpses of Bethesda’s new universe

    Three new Starfield animated shorts offer more glimpses of Bethesda’s new universe

    Some top AMD chips have a huge security flaw

    Some top AMD chips have a huge security flaw

    What is a Linux Bash Script and How Do You Build One?

    What is a Linux Bash Script and How Do You Build One?

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
  • Entertainment
  • Sports
  • CryptoCurrency
  • Business
  • Health and Lifestyle
    • All
    • Food
    World IVF Day: Infertility is a silent epidemic – why is it important to tackle fertility problems?  experts tell

    World IVF Day: Infertility is a silent epidemic – why is it important to tackle fertility problems? experts tell

    What is ‘duck walk’ in old age?  Expert shares tips on maintaining normal mobility

    What is ‘duck walk’ in old age? Expert shares tips on maintaining normal mobility

    Radiohead brands portfolio expands with the launch of Hustle™ energy drink.  Unveiled through new campaign “Dreams are free, #HustleModeOn for everything else – Food Marketing Technology”

    Radiohead brands portfolio expands with the launch of Hustle™ energy drink. Unveiled through new campaign “Dreams are free, #HustleModeOn for everything else – Food Marketing Technology”

    From Chris Gayle to Virat Kohli: Most runs scored by players in India vs West Indies ODI series

    From Chris Gayle to Virat Kohli: Most runs scored by players in India vs West Indies ODI series

    Infertility Treatment: How Ayurveda Can Help Increase Fertility?  experts tell

    Infertility Treatment: How Ayurveda Can Help Increase Fertility? experts tell

    Ishant Sharma opens up about the truth behind Zaheer Khan’s Test retirement and the allegations against Virat Kohli

    Ishant Sharma opens up about the truth behind Zaheer Khan’s Test retirement and the allegations against Virat Kohli

    Trending Tags

    • Golden Globes
    • Game of Thrones
    • MotoGP 2017
    • eSports
    • Fashion Week
No Result
View All Result
  • Home
  • Tech
    • All
    • Apps
    • Gadgets
    Google’s CFO just got promoted

    Google’s CFO just got promoted

    How Google’s latest AI model is generating music from your brain activity

    How Google’s latest AI model is generating music from your brain activity

    Easy Rider to Midnight Run, The Greatest Roadtrips Movies of All Time

    Easy Rider to Midnight Run, The Greatest Roadtrips Movies of All Time

    Three new Starfield animated shorts offer more glimpses of Bethesda’s new universe

    Three new Starfield animated shorts offer more glimpses of Bethesda’s new universe

    Some top AMD chips have a huge security flaw

    Some top AMD chips have a huge security flaw

    What is a Linux Bash Script and How Do You Build One?

    What is a Linux Bash Script and How Do You Build One?

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
  • Entertainment
  • Sports
  • CryptoCurrency
  • Business
  • Health and Lifestyle
    • All
    • Food
    World IVF Day: Infertility is a silent epidemic – why is it important to tackle fertility problems?  experts tell

    World IVF Day: Infertility is a silent epidemic – why is it important to tackle fertility problems? experts tell

    What is ‘duck walk’ in old age?  Expert shares tips on maintaining normal mobility

    What is ‘duck walk’ in old age? Expert shares tips on maintaining normal mobility

    Radiohead brands portfolio expands with the launch of Hustle™ energy drink.  Unveiled through new campaign “Dreams are free, #HustleModeOn for everything else – Food Marketing Technology”

    Radiohead brands portfolio expands with the launch of Hustle™ energy drink. Unveiled through new campaign “Dreams are free, #HustleModeOn for everything else – Food Marketing Technology”

    From Chris Gayle to Virat Kohli: Most runs scored by players in India vs West Indies ODI series

    From Chris Gayle to Virat Kohli: Most runs scored by players in India vs West Indies ODI series

    Infertility Treatment: How Ayurveda Can Help Increase Fertility?  experts tell

    Infertility Treatment: How Ayurveda Can Help Increase Fertility? experts tell

    Ishant Sharma opens up about the truth behind Zaheer Khan’s Test retirement and the allegations against Virat Kohli

    Ishant Sharma opens up about the truth behind Zaheer Khan’s Test retirement and the allegations against Virat Kohli

    Trending Tags

    • Golden Globes
    • Game of Thrones
    • MotoGP 2017
    • eSports
    • Fashion Week
No Result
View All Result
Journal Official
No Result
View All Result
Home Tech

Aqua security study finds 1,400% increase in memory attacks

admin by admin
June 30, 2023
in Tech
0
Aqua security study finds 1,400% increase in memory attacks
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter


News bulletin

Sed ut perspiciatis eggs.

subscribe

Image: Tipboard/Adobe Stock

According to Aqua Security’s 2023 Cloud Native Threat Report, threat actors are increasingly turning their attention to exploits that avoid detection and go unnoticed within systems, including in-memory attacks across networks and software supply chains. is checked.

Must Read Security Coverage

Nautilus, the research arm of cloud native security firm, saw a 1,400% increase in memory attacks compared to what the company reported in its 2022 study. According to Aqua Security, Nautilus analyzed 700,000 attacks on its global network of honeypots over the six-month study period.

The Nautilus team reported that more than 50% of the attacks focused on defense evasion and included stealth techniques such as executing files from /tmp , a location used to store temporary files. The attacks also involved obfuscating files or information, such as dynamic loading of code, which loads libraries—in this case malicious—into memory at runtime, leaving no suspicious digital trail.

Asaf Morag, principal threat intelligence researcher at Aqua Nautilus, said the group’s discovery of Redis-based malware Headcrab, which compromised more than 1,200 servers, highlighted how memory attacks were escaping agentless solutions, Those who remotely monitor, patch and scan systems. , That’s because, unlike agent-based systems, they aren’t installed on client machines, Morag explained.

“When it comes to runtime security, only agent-based scanning can detect attacks that volume-based scanning techniques are designed to avoid, and they are important because piracy techniques are constantly evolving. are,” he said.

jump to:

What are memory attacks?

Memory attacks (aka living-off-the-land or fileless attacks) exploit software, apps, and protocols contained within a target system to perform malicious activities. As explained by Jen Osborne, Deputy Director of Threat Intel at Palo Alto Networks Unit 42, memory attacks are hard to track because they leave no digital trail.

  • In memory attacks do not require an attacker to put code or script on the system.
  • In memory attacks are not written to disk and instead tools such as PowerShell, Windows Management Instrumentation or even the password-saving tool Mimikatz are used for the attack.

“They’re (launching memory exploits) because they’re so hard to detect and find later, because many times, they’re not kept in the log,” Osborne said.

WATCH: Palo Alto Networks’ Prisma Cloud CTO Ori Segal discusses code for cloud security (TechRepublic)

In a 2018 blog, Josh Fu, currently director of product marketing at endpoint management software company Tanium, explained that memory attacks aim to feed instructions or extract data into RAM or ROM. Unlike attacks that focus on disk file directories or registry keys, memory attacks are harder to detect, even by antivirus software.

Fu said memory attacks typically operate as follows:

  1. First, a script or file accesses the endpoint. It escapes recognition because it resembles a set of instructions rather than specific file features.
  2. Those instructions are then loaded into the machine.
  3. Once they are executed, attackers use the system’s own tools and resources to carry out the attack.

Fu wrote that guards can help prevent and mitigate memory attacks:

  • Stay updated on patching.
  • Block websites that run Flash, Silverlight, or JavaScript, or prevent them from running on sites that request that they be enabled.
  • Restricting the use of macros in documents.
  • This paper is a study on how attackers use Mimikatz to crack passwords.

Cloud software supply chain vulnerabilities exposed

The Aqua Nautilus report, which also looked at cloud software supply chain risks including misconfiguration, observed that actors are exploiting software packages and using them as attack vectors. For example, they discovered a logic flaw they call “package planning” that allows attackers to disguise malicious packages as legitimate code.

In addition, researchers reported a vulnerability in all Node.js versions that could allow malicious code to be embedded in packages, resulting in privilege escalation and malware persisting in Windows environments.

The firm reported that the top 10 vulnerabilities identified in its global network in 2022 (excluding log4shell, which far outnumbered the rest) were mostly related to the ability to perform remote code execution. “This reinforces the idea that attackers are looking for early access and running malicious code on remote systems,” the authors said.picture a,

picture a

Top 10 Vulnerabilities in 2022.
Top 10 Vulnerabilities Scanned in 2022. Image: Aqua Nautilus.

Security of the runtime environment is critical

According to the report, memory attacks that exploit workloads at runtime, where code executes, are becoming an increasingly popular target for malicious actors looking to steal data or disrupt business operations.

The authors said that addressing vulnerabilities and misconfigurations in the source code is important because:

  • Prioritizing and fixing known vulnerabilities can take time, leaving the runtime environment exposed.
  • Security practitioners may be unaware of or miss supply chain attack vectors, creating a direct and uncontrolled link to production environments.
  • Critical production configurations can still be overlooked in high-velocity, complex, and multi-vendor cloud environments.
  • Zero-day vulnerabilities are possible, making it necessary to have a monitoring system in place for malicious incidents in production.

The study authors also said that simply scanning known malicious files and network communications and then blocking them and alerting security teams was not enough. Enterprises should also monitor for indicators of malicious behavior, such as unauthorized attempts to access sensitive data, attempts to hide processes by escalating privileges, and the opening of backdoors to unknown IP addresses.

Previous Post

Will Europe’s Digital Euro Really Protect Privacy?

Next Post

Fearless farmer treats giant lioness ‘like a dog’, rescues his cow like a professional

admin

admin

Next Post
Fearless farmer treats giant lioness ‘like a dog’, rescues his cow like a professional

Fearless farmer treats giant lioness 'like a dog', rescues his cow like a professional

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Journal Official

Welcome to our News Magazine Website, your go-to source for the latest and most compelling news around the Globe. Stay informed, stay inspired, and explore the world through our comprehensive and user-friendly platform.

Follow Us

Recent posts

  • Open Access vs. Subscription: Masa Depan Aksesibilitas Jurnal Akademik
  • Strategi Memilih Jurnal yang Tepat untuk Naskah Penelitian Anda
  • Peran Jurnal Terindeks Scopus: Mengapa Penting untuk Karier Akademik
  • Etika Penulisan Ilmiah: Menghindari Plagiarisme dan Pelanggaran Kode Etik
  • Memahami Proses Peer Review: Kunci Kualitas Publikasi Ilmiah

Recent News

Open Access vs. Subscription: Masa Depan Aksesibilitas Jurnal Akademik

December 7, 2025

Strategi Memilih Jurnal yang Tepat untuk Naskah Penelitian Anda

December 7, 2025
  • Home
  • About Us
  • Privacy Policy
  • Contact Us
  • Disclaimer
  • Terms & Conditions

© 2023 Journal Official - News Magazine

No Result
View All Result
  • Disclaimer

© 2023 Journal Official - News Magazine