Emerging Attack Vector: Cloud Database Services as New Malware Platform
REDWOOD SHORES, Calif., December 11, 2013 - Imperva, Inc. (NYSE: IMPV), pioneering the third pillar of enterprise security with a new layer of protection designed specifically for physical and virtual data centers, today released its latest Hacker Intelligence Initiative report, "Assessing the Threat Landscape of DBaaS." Through an in-depth analysis of malware that used a shared hosting database for its Command and Control and drop server, Imperva discovered a new malware platform for cybercriminals: Database as a Service (DBaaS). The report concludes that by bringing data one step closer to hackers, DBaaS makes it possible for hackers to compromise an organization's database without accessing its network - ultimately increasing the risk of a data breach.
"Our research suggests that we will soon see autonomous malware targeting internal databases within organizations - which we believe would lead to a greater risk of infection and compromise within a network," said Amichai Shulman, chief technology officer at Imperva. "Organizations need to take the risks posed by cloud services into consideration as they decide which data they want to store externally, and adopt a mitigation strategy accordingly."
While the perceived risk of cloud services is already high, the report identifies two factors in particular that increase risk to corporate data: the relative ease of accessing cloud databases, as well as the ease of quickly turning a legitimate foothold on these servers into a privilege escalation attack. Key findings also include:
Malware is now capable of connecting to both local and remote databases to retrieve, manipulate and exfiltrate information.
Malware can leverage DBaaS for botnet management (e.g., Command & Control as well as Dropper functionality).
Cloud databases are prone to attacks via both privilege escalation and exposed vulnerabilities, as opposed to on-premise databases, which are mostly compromised via privilege escalation.
To download the full Imperva report, please visit http://www.imperva.com/download.asp?id=436.