Supply Chain Attacks in the Age of Cloud Computing: Risks, Mitigations, and the Importance of Securing Back Ends
Image Description
Common Information
Type Value
UUID ef425214-f8cc-4e6b-893f-f8814c9e276c
Fingerprint cb89237c3359138d5c3d8465a965447c07dedba3c0ba6c7292d0e3300ac93430
Analysis status DONE
Considered CTI value 2
Text language
Published Oct. 26, 2020, 4:38 p.m.
Added to db April 14, 2024, 10:53 a.m.
Last updated Aug. 30, 2024, 10:52 p.m.
Headline Supply Chain Attacks in the Age of Cloud Computing: Risks, Mitigations, and the Importance of Securing Back Ends
Title Supply Chain Attacks in the Age of Cloud Computing: Risks, Mitigations, and the Importance of Securing Back Ends
Detected Hints/Tags/Attributes 123/1/53
Attributes
Details Type #Events CTI Value
Details CVE 2
cve-2019-10348
Details CVE 2
cve-2019-10350
Details CVE 2
cve-2019-10351
Details CVE 1
cve-2019-10361
Details CVE 1
cve-2019-10366
Details CVE 2
cve-2019-10378
Details CVE 2
cve-2019-10385
Details CVE 1
cve-2019-10440
Details CVE 1
cve-2019-10433
Details CVE 2
cve-2019-5021
Details Domain 245
shutterstock.com
Details Domain 1
www.netsurion.com
Details Domain 53
blog.avast.com
Details Domain 604
www.trendmicro.com
Details Domain 1
2018.zeronights.ru
Details Domain 177
blog.trendmicro.com
Details Domain 13
www.jenkins.io
Details Domain 6
plugins.jenkins.io
Details Domain 29
www.cvedetails.com
Details Domain 251
www.bleepingcomputer.com
Details Domain 145
threatpost.com
Details Domain 18
docs.docker.com
Details Domain 1373
twitter.com
Details Domain 15
blog.aquasec.com
Details Domain 71
kubernetes.io
Details Domain 26
azure.microsoft.com
Details Domain 6
code.visualstudio.com
Details File 1
unsecured-redis-instances-found-in-the-cloud.html
Details File 1
15-redis-post-exploitation.pdf
Details File 1
exposed-redis-instances-abused-for-remote-code-execution-cryptocurrency-mining.html
Details File 1
jenkins-script-security.html
Details File 17
docs.doc
Details File 4
security-risks-in-online-coding-platforms.html
Details Url 1
https://www.netsurion.com
Details Url 1
https://blog.avast.com/ccleaner-fights-off-cyberespionage-attempt-abiss.
Details Url 1
https://www.trendmicro.com/en_us/research/20/d/more-than-8-000-
Details Url 1
https://2018.zeronights.ru/wp-
Details Url 26
https://www.trendmicro.com
Details Url 12
https://blog.trendmicro.com/trendlabs-
Details Url 1
https://www.jenkins.io/security
Details Url 1
https://plugins.jenkins.io/script-security/.
Details Url 1
https://www.cvedetails.com/product/35997/jenkins-script-security.html?vendor_id=15865
Details Url 1
https://www.bleepingcomputer.com/news/security/17-backdoored-docker-images-removed-
Details Url 1
https://threatpost.com/alpine-linux-docker-images-unlocked/.
Details Url 1
https://docs.docker.com/engine/security/rootless/.
Details Url 1
https://twitter.com/_fel1x
Details Url 1
https://blog.trendmicro.com/trendlabs-security-intelligence/why-
Details Url 2
https://blog.aquasec.com/threat-alert-kinsing-malware-container-vulnerability.
Details Url 1
https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/guidance-on-kubernetes-threat-
Details Url 4
https://www.trendmicro.com/en_us/research/20/c/security-risks-in-online-coding-platforms.html
Details Url 1
https://kubernetes.io/docs/concepts
Details Url 3
https://azure.microsoft.com
Details Url 1
https://code.visualstudio.com/api/working-