<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ransomware against Linux systems especially those in the cloud in Cloud Security</title>
    <link>https://community.isc2.org/t5/Cloud-Security/Ransomware-against-Linux-systems-especially-those-in-the-cloud/m-p/49993#M156</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1226038393"&gt;@Clay498&lt;/a&gt;&amp;nbsp;&amp;nbsp; Unfortunately from my research, quickly dancing my fingers across the keyboard - ransomware can attack and access cloud storage:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.hubstor.net/blog/ransomware-infect-cloud-storage/" target="_blank" rel="noopener"&gt;https://www.hubstor.net/blog/ransomware-infect-cloud-storage/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://parablu.com/reaching-for-the-cloud-can-ransomware-infect-cloud-storage/" target="_blank" rel="noopener"&gt;https://parablu.com/reaching-for-the-cloud-can-ransomware-infect-cloud-storage/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.zdnet.com/article/ransomware-victims-thought-their-backups-were-safe-they-were-wrong/" target="_blank" rel="noopener"&gt;https://www.zdnet.com/article/ransomware-victims-thought-their-backups-were-safe-they-were-wrong/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://techmonitor.ai/technology/cybersecurity/ransomcloud" target="_blank" rel="noopener"&gt;https://techmonitor.ai/technology/cybersecurity/ransomcloud&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://spinbackup.com/blog/is-cloud-storage-safe-from-ransomware/" target="_blank" rel="noopener"&gt;https://spinbackup.com/blog/is-cloud-storage-safe-from-ransomware/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Plus of course every vendor has a solution, including processes, encryption and incremental backups etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if there is a weakness, then the growing sophistication of ransomware attackers, will find a hole in the Armour somewhere.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately the answer, cloud storage, if it is not protected, or the Cloud Service Provider (CSP) does not commit to their Shared Responsibility Model.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I even looked up the AWS secure services and they have produced a book on the matter:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://aws.amazon.com/blogs/publicsector/securing-aws-cloud-environment-ransomware-new-ebook/" target="_blank" rel="noopener"&gt;https://aws.amazon.com/blogs/publicsector/securing-aws-cloud-environment-ransomware-new-ebook/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Mar 2022 05:46:29 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2022-03-08T05:46:29Z</dc:date>
    <item>
      <title>Ransomware against Linux systems especially those in the cloud</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Ransomware-against-Linux-systems-especially-those-in-the-cloud/m-p/49973#M153</link>
      <description>&lt;P&gt;Hi All&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to the VMware 2022 report, Linux is now fast becoming the preferred target in order to attack Cloud based systems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://jetpatch.com/blog/patch-management/rising-ransomware-trend-why-is-linux-suddenly-a-target/" target="_blank"&gt;https://jetpatch.com/blog/patch-management/rising-ransomware-trend-why-is-linux-suddenly-a-target/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It appears that Linux systems are becoming a target via Ransomware attacks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:07:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Ransomware-against-Linux-systems-especially-those-in-the-cloud/m-p/49973#M153</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T10:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware against Linux systems especially those in the cloud</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Ransomware-against-Linux-systems-especially-those-in-the-cloud/m-p/49974#M154</link>
      <description>&lt;P&gt;Only makes sense that as tools for interoperability are developed that the hackers/crackers would leverage them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the article.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Mar 2022 23:30:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Ransomware-against-Linux-systems-especially-those-in-the-cloud/m-p/49974#M154</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2022-03-06T23:30:08Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware against Linux systems especially those in the cloud</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Ransomware-against-Linux-systems-especially-those-in-the-cloud/m-p/49993#M156</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1226038393"&gt;@Clay498&lt;/a&gt;&amp;nbsp;&amp;nbsp; Unfortunately from my research, quickly dancing my fingers across the keyboard - ransomware can attack and access cloud storage:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.hubstor.net/blog/ransomware-infect-cloud-storage/" target="_blank" rel="noopener"&gt;https://www.hubstor.net/blog/ransomware-infect-cloud-storage/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://parablu.com/reaching-for-the-cloud-can-ransomware-infect-cloud-storage/" target="_blank" rel="noopener"&gt;https://parablu.com/reaching-for-the-cloud-can-ransomware-infect-cloud-storage/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.zdnet.com/article/ransomware-victims-thought-their-backups-were-safe-they-were-wrong/" target="_blank" rel="noopener"&gt;https://www.zdnet.com/article/ransomware-victims-thought-their-backups-were-safe-they-were-wrong/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://techmonitor.ai/technology/cybersecurity/ransomcloud" target="_blank" rel="noopener"&gt;https://techmonitor.ai/technology/cybersecurity/ransomcloud&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://spinbackup.com/blog/is-cloud-storage-safe-from-ransomware/" target="_blank" rel="noopener"&gt;https://spinbackup.com/blog/is-cloud-storage-safe-from-ransomware/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Plus of course every vendor has a solution, including processes, encryption and incremental backups etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if there is a weakness, then the growing sophistication of ransomware attackers, will find a hole in the Armour somewhere.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately the answer, cloud storage, if it is not protected, or the Cloud Service Provider (CSP) does not commit to their Shared Responsibility Model.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I even looked up the AWS secure services and they have produced a book on the matter:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://aws.amazon.com/blogs/publicsector/securing-aws-cloud-environment-ransomware-new-ebook/" target="_blank" rel="noopener"&gt;https://aws.amazon.com/blogs/publicsector/securing-aws-cloud-environment-ransomware-new-ebook/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 05:46:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Ransomware-against-Linux-systems-especially-those-in-the-cloud/m-p/49993#M156</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2022-03-08T05:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware against Linux systems especially those in the cloud</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Ransomware-against-Linux-systems-especially-those-in-the-cloud/m-p/49998#M158</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi All&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to the VMware 2022 report, Linux is now fast becoming the preferred target in order to attack Cloud based systems.&amp;nbsp;&lt;A href="https://www.njmcdirect.tips/" target="_blank" rel="noopener"&gt;&lt;FONT color="#FFFFFF"&gt;njmcdirect.com&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://jetpatch.com/blog/patch-management/rising-ransomware-trend-why-is-linux-suddenly-a-target/" target="_blank" rel="noopener"&gt;https://jetpatch.com/blog/patch-management/rising-ransomware-trend-why-is-linux-suddenly-a-target/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It appears that Linux systems are becoming a target via Ransomware attacks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN&gt;Only makes sense that as tools for interoperability are developed that the hackers/crackers would leverage them.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 05:32:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Ransomware-against-Linux-systems-especially-those-in-the-cloud/m-p/49998#M158</guid>
      <dc:creator>Alfred4277</dc:creator>
      <dc:date>2022-03-09T05:32:55Z</dc:date>
    </item>
  </channel>
</rss>

