Tuesday, December 6, 2022





Cloud computing is a great new technology that has revolutionized how we store and access data. However, like any new technology, it is also vulnerable to attack.

It constitutes two sorts of risks that include technical and non-technical. Technical risks include data loss, data breaches, system crashes, and malicious attacks on the cloud infrastructure. Non-technical ones are combined with the matters related to privacy concerns and the security of data resources.

These are the most common type of cyber-attacks on cloud-based infrastructures or products which use services from the cloud provider itself.

1. Data breaches:

One of the most common ways that cloud computing can be attacked is through data breaches. This occurs when hackers gain access to a company’s or individual’s data that is stored in the cloud. They can then use this data for identity theft, financial fraud, or other malicious purposes.

2. Retraction of service:

This occurs when hackers overload a system with requests, causing it to crash or become unusable.

3. Hacking by Malware:

Malware is another common way that hackers can attack cloud computing systems. This malicious software can infect a system and allow hackers to gain control of it or steal sensitive data.

4. Fraudulent Imposters:

Cloud-based systems make it easier for hackers to trick users by pretending to be a trustworthy entity, such as a bank or social media platform.

5. Ransomware:

Ransomware is malware that locks up all of the files on a computer until the victim pays for its removal. Since cloud computing stores data and programs in one location, ransomware can spread across databases and quickly infect all of a cloud’s clients, shutting down an entire organization.

What are the issues with the cloud?

The cloud is often lauded as being more secure than traditional on-premises systems, but that doesn’t mean it’s immune to attack. The very nature of the cloud – with its shared resources and interconnectedness – can make it more vulnerable in some ways to cyber attacks.

1. Insufficient security controls:

When configuring a cloud system, organizations need to be aware of the potential security risks and put in place adequate safeguards. Unfortunately, many companies don’t do this properly, leaving their systems open to attack.

2. Malicious insiders:

Cloud providers have access to an organization’s data and systems, making them a prime target for malicious insiders. This was the case in 2014 when an employee of Amazon’s AWS division was arrested for launching a series of attacks on customer accounts.

3. Compromised credentials:

One of the most common ways attackers gain access to cloud systems is by stealing user credentials, such as passwords or API keys. Once they have these credentials, attackers can easily log into the system and run malicious code.

4. Threat actors:

Organizations with sensitive data are always a target for criminals who want to get their hands on confidential information with the intent of selling it or committing fraud. An attacker could convince an organization they represent a customer and when the organization provides them cloud services, they can easily steal data and attack the system before disappearing.

5. Configuration errors:

Finally, configuration errors in cloud providers’ systems can put organizations at risk for DDoS attacks to be used in other types of cyber-attacks such as identity or data fraud committed by an insider threat actor. The 2009 cyber-attack on Google was performed by ACORN — a group whose members defaced servers via SSH brute-forcing attacks — demonstrating that any networked

What are the cloud’s most vulnerable threats?

Cloud services offer convenience, flexibility, and often, cost savings. But along with these benefits come increased risks when it comes to cybersecurity. Research shows that the cloud is becoming more vulnerable to cyber-attacks. According to a study by Symantec, 43 percent of organizations have experienced a cloud security breach in the past year.

What makes the cloud so vulnerable to attack? There are several factors, but one of the biggest is the fact that many users don’t fully understand how to secure their data in the cloud. Another factor is the fact that cloud environments are often complex, with multiple users and service providers sharing data and resources.

How remote-controlled malware obtain data from the infected machines

Most organizations these days are turning to the cloud to store their data and protect their information. However, what many don’t realize is that the cloud is just as vulnerable to cyber attacks as any other network. One of the most common ways that remote-controlled malware can infect an enterprise network is by gaining access to video and audio data that is stored in the cloud. By doing this, hackers can not only eavesdrop on private conversations, but they can also use this information to launch further attacks.

How to protect Cloud from an attack

As more and more businesses move to the cloud, it’s important to be aware of the potential for cloud-based attacks. While the cloud offers many advantages in terms of flexibility and scalability, it also introduces new security challenges. Here are some tips on how to protect your cloud environment from attack:

1. Use Authorization controls

Make sure that only authorized users have access to your cloud systems, and that they are using strong passwords or two-factor authentication.

2. Encrypt your data

 Use SSL/TLS encryption for all communications with your cloud provider, and encrypt sensitive data at rest using encryption keys that are managed securely.

3. Implement a security strategy

Your cloud security strategy should include preventative measures such as firewalls and intrusion detection/prevention systems, as well as response plans in the event of an attack.

4. Update Security Tools

Be sure to keep your security tools and systems up to date, and stay informed about the latest security threats so that you can quickly identify and respond to any attacks against your system


As cyber security authors, we ensure that people are considering how security affects cloud computing, not just computer safety in general. Not just a generalized view but focuses on using sound definitions of risk factors, such as how the type of data you’re trying to protect could affect the safety level accordingly.

Cloud computing allows businesses to store their data securely while also having access to it at any time of day or night. Cloud services are often fragile and susceptible to malware, especially because 92% of companies store some or all of their data in the clouds. Hacking incidents and data breaches result in great losses, which is also a useful source of funding for hackers.