Reserchers discovered in Google Cloud, AWS, and Azure Explore 34 Million Vulnerabilities

Researchers at Palo Alto Networks discovered 34 million vulnerabilities in large cloud services. According to experts, the problems arose not through the fault of providers, but because of applications that clients deploy to the cloud.

According to a report covering the period from January 2018 to June 2019, experts discovered more than 29 million vulnerabilities in Amazon Elastic Compute Cloud, about 4 million in Google Compute Engine, and 1.7 million in Microsoft in Azure Virtual Machine.

The main causes of vulnerabilities are obsolete Apache servers and vulnerable jQuery packages.

Read also: Lightning cable for hacking a computer on macOS is on sale

Additionally, the growing popularity of container platforms contributed to the list of problems. Specialists found more than 23 thousand containers of Docker and a little more than 20 thousand containers of Kubernetes with factory configurations available on the Internet.

“Research reveals more than 40,000 container systems operate under default configurations. This represents nearly 51% of all publicly exposed Docker containers. Many of the systems identified allowed for unauthenticated access to the data they contained. Palo Alto Networks recommends at least placing every container with sensitive data behind a properly configured security policy or an external-facing firewall that prevents access from the internet”, — report reserchers from Palo Alto Networks.

Hackers are also well aware of this situation, the report said. About 65% of all attacks on cloud services are related to incorrect configuration. Attacks always resulted in a data leak.

“Organizations that had at least one Remote Desktop Protocol (RDP) service exposed to the entire internet amounted to 56%, despite the fact that all major cloud providers natively give consumers the ability to restrict inbound traffic”, — report in Palo Alto Networks.

Researchers were also stanned by the amount of cryptocurrency mining malware, including from the Rocke group.
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button