{"id":27702,"date":"2021-01-08T09:39:33","date_gmt":"2021-01-08T12:39:33","guid":{"rendered":"https:\/\/abes.org.br\/?p=27702"},"modified":"2021-01-04T13:47:23","modified_gmt":"2021-01-04T16:47:23","slug":"cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\/","title":{"rendered":"Cybercriminals use cloud technology to accelerate business attacks"},"content":{"rendered":"<p><em>Trend Micro research found terabytes of stolen data sold in cloud logs, making cybercrime more widespread and effective<\/em><em>\u00a0<\/em><\/p>\n<p>Trend Micro, a reference in cloud security, has identified a new type of cyber crime. Criminals are using cloud services and technology to accelerate attacks, which reduces the amount of time companies have to identify and respond to a breach.<\/p>\n<p>Trend Micro Research found terabytes of internal business data and logins for popular providers like Amazon, Google, Twitter, Facebook and PayPal for sale on the dark web. This data is sold through access to the cloud logs in which it is stored. This results in more stolen accounts being monetized, and the time from initial data theft to stolen information being used against a company has decreased from weeks to days or hours.<\/p>\n<p>&quot;The new market for access to cloud logs ensures that stolen information can be used more quickly and effectively by the cybercrime community - this is bad news for corporate security teams,&quot; says Robert McArdle, director of threat research Trend Micro&#039;s future plans. \u201cThis new market shows how criminals are using cloud technologies to compromise you, which also means that a company is not protected from this method of attack if it uses only on-premises services. All organizations will need to double preventive measures and ensure that they have the necessary visibility and controls to react quickly to any incidents that occur. \u201d<\/p>\n<p>As soon as access is acquired for stolen data logs based on the cloud, the buyer uses the information for secondary infection. For example, Remote Desktop Protocol (RDP) credentials can be found in these logs and are a popular entry point for criminals looking to attack companies with ransomware.<\/p>\n<p>Storing terabytes of stolen data in cloud environments has the same appeal to criminal companies as to legitimate organizations. Cloud storage offers scalability and speed, providing greater computing power and bandwidth to optimize operations.<\/p>\n<p>Access to these cloud data logs is generally sold by subscription for up to US$ 1,000 per month. Access to a single log can include millions of records, and higher prices are obtained for frequently updated data sets or the promise of relative exclusivity.<\/p>\n<p>With immediate access to data in this way, cybercriminals can streamline and accelerate the execution of attacks and potentially expand the number of targets. The result is the optimization of cyber crime, ensuring that specialized threat agents in specific areas - for example, cryptocurrency theft or e-commerce fraud - can gain access to the data they need quickly, easily and relatively cheaply.<\/p>\n<p>The Trend Micro study warns that in the future, such activity may even give rise to a new type of cybercriminal - a data mining expert who uses machine learning to improve pre-processing and information extraction to maximize its usefulness for buyers. The general trend will be the standardization of services and prices, as the sector matures and becomes more professional.<\/p>\n<p>To see the full report, visit:<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/cybercriminal-cloud-of-logs-the-emerging-underground-business-of-selling-access-to-stolen-data\">https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/cybercriminal-cloud-of-logs-the-emerging-underground-business-of-selling-access-to-stolen-data<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Pesquisa da Trend Micro encontrou terabytes de dados roubados vendidos em logs de nuvem, tornando o cibercrime mais generalizado e eficaz\u00a0 A Trend Micro, refer\u00eancia em seguran\u00e7a na nuvem, identificou um novo tipo de crime cibern\u00e9tico. Os criminosos est\u00e3o usando servi\u00e7os e tecnologia em nuvem para acelerar os ataques, o que diminui a quantidade de [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[379,569,573,571,570,572,265],"class_list":["post-27702","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias","tag-cibercrime","tag-criptomoedas","tag-dark-web","tag-extracao-de-informacoes","tag-fraude-de-e-commerce","tag-logs-de-nuvem","tag-machine-learning"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cibercriminosos usam tecnologia em nuvem para acelerar ataques empresariais - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cibercriminosos usam tecnologia em nuvem para acelerar ataques empresariais - ABES\" \/>\n<meta property=\"og:description\" content=\"Pesquisa da Trend Micro encontrou terabytes de dados roubados vendidos em logs de nuvem, tornando o cibercrime mais generalizado e eficaz\u00a0 A Trend Micro, refer\u00eancia em seguran\u00e7a na nuvem, identificou um novo tipo de crime cibern\u00e9tico. Os criminosos est\u00e3o usando servi\u00e7os e tecnologia em nuvem para acelerar os ataques, o que diminui a quantidade de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-08T12:39:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3509\" \/>\n\t<meta property=\"og:image:height\" content=\"2482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Cibercriminosos usam tecnologia em nuvem para acelerar ataques empresariais\",\"datePublished\":\"2021-01-08T12:39:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\\\/\"},\"wordCount\":600,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"keywords\":[\"cibercrime\",\"criptomoedas\",\"dark web\",\"extra\u00e7\u00e3o de informa\u00e7\u00f5es\",\"fraude de e-commerce\",\"logs de nuvem\",\"machine learning\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\\\/\",\"name\":\"Cibercriminosos usam tecnologia em nuvem para acelerar ataques empresariais - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"datePublished\":\"2021-01-08T12:39:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cibercriminosos usam tecnologia em nuvem para acelerar ataques empresariais\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cibercriminosos usam tecnologia em nuvem para acelerar ataques empresariais - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\/","og_locale":"en_US","og_type":"article","og_title":"Cibercriminosos usam tecnologia em nuvem para acelerar ataques empresariais - ABES","og_description":"Pesquisa da Trend Micro encontrou terabytes de dados roubados vendidos em logs de nuvem, tornando o cibercrime mais generalizado e eficaz\u00a0 A Trend Micro, refer\u00eancia em seguran\u00e7a na nuvem, identificou um novo tipo de crime cibern\u00e9tico. Os criminosos est\u00e3o usando servi\u00e7os e tecnologia em nuvem para acelerar os ataques, o que diminui a quantidade de [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2021-01-08T12:39:33+00:00","og_image":[{"width":3509,"height":2482,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png","type":"image\/png"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Cibercriminosos usam tecnologia em nuvem para acelerar ataques empresariais","datePublished":"2021-01-08T12:39:33+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\/"},"wordCount":600,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"keywords":["cibercrime","criptomoedas","dark web","extra\u00e7\u00e3o de informa\u00e7\u00f5es","fraude de e-commerce","logs de nuvem","machine learning"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\/","url":"https:\/\/abes.org.br\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\/","name":"Cibercriminosos usam tecnologia em nuvem para acelerar ataques empresariais - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"datePublished":"2021-01-08T12:39:33+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/cibercriminosos-usam-tecnologia-em-nuvem-para-acelerar-ataques-empresariais\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Cibercriminosos usam tecnologia em nuvem para acelerar ataques empresariais"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-18 12:55:46","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/27702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=27702"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/27702\/revisions"}],"predecessor-version":[{"id":27703,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/27702\/revisions\/27703"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=27702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=27702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=27702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}