LIVE THREAT BRIEFING How Threat Actors Use Compromised Non-Human Identities for LLMjacking

[REGISTER NOW]
Illustration Cloud

Permiso weighs in on CrowdStrike's LemonDuck malware finding

On April 22, Permiso provided their perspective of CrowdStrike’s recent publication on LemonDuck malware shifting targeting to container and cloud technologies in the CSO Online article “Cryptomining botnet targeting Docker on Linux systems”. While crypto mining malware is not typically perceived as a highly sophisticated operation, this does provide a public example of attackers shifting tactics to take advantage of cloud resources, and general lack of detection tooling and expertise in the cloud.

With this version of LemonDuck malware, the initial infection was focused on the Docker API. One of the more interesting facets of this iteration of LemonDuck beyond the Docker targeting is that it specifically disabled Alibaba’s cloud monitoring service endpoint. Learn more about the campaign and see experts weigh in:

Illustration Cloud

Related Articles

Survey Reveals Gaping Disconnect Between Existing Security Controls and the Identity Security Threat Reality

Respondents are confident in their identity security posture, despite almost half reporting unauthorized access to their environment coupled with growing concerns over the ability to detect identity-based attacks PALO ALTO, CA – October 17, 2024 -

Permiso Launches Universal Identity Graph to Help Organizations Secure All Identities Across All Environments

Permiso’s recent product launch provides a centralized hub to secure all human and non-human identities across both cloud and on-premise environments PALO ALTO, CA – September 19, 2024 -- Permiso, the leader in identity security, has announced the

Permiso Named SC Awards Finalist In Two Categories

The identity security company has been named a finalist for both Most Promising Early Stage Startup and Best Threat Detection Technology categories

View more posts