AT & T A recent study by the company revealed that cyber attackers' most recent attacks were cloud infrastructures for businesses. In the research, there are many detailed information from the attackers to the methods they carry out their activities.
The Bear Market Didn't Listen
US-based telecommunications company AT & T cyber security The research carried out by the branch showed that cyber attackers continued their attacks despite the still bear market. According to the research, crypto-money mining attacks against small, medium and large enterprises are increasing.
In the research report, AT & T is the most preferred attacker spy mining (cryptojacking) stands on methods. According to this, the four basic cryptojacking tactics of the attackers on the mining attacks in the company's cloud infrastructures were identified.
Hackers Attack It
According to the details of the research in our news, the most preferred methods of hackers in mining attacks are listed below: Reconciliation with management platforms, control panel exploitation, robbery and malicious files in the application programming interface.
Management platforms can be defined as the place where an entity holds all the files and documents required to run the software. According to what AT & T researchers have found, crypto-money mining intruders compromise the management platform of the enterprise using unauthorized management interfaces. So the hackers are illegal. crypto money mining He can do.
As is known, cryptojacking means that malicious people use the processing power of the victims for cryptocurrency operations. This method is widely used in this area, thanks to the attackers can obtain crypto money. You can find a news story about this topic.