TMCnet News
Aqua Nautilus Reveals Millions of Potential Kinsing Attacks DailySAN FRANCISCO, May 06, 2024 (GLOBE NEWSWIRE) -- Aqua Security, the pioneer in cloud native security, today published a new report, "Kinsing Exposed: From Myth to Architecture - A Complete Cybersecurity Chronicle.” Aqua Security’s research team, Aqua Nautilus, invested years of research and analysis into understanding Kinsing, identifying more than 75 applications actively exploited by Kinsing. The comprehensive report highlights the infrastructure, tactics, techniques and modus operandi of Kinsing and highlights the threat posed by Kinsing to enterprises worldwide. First emerging as a cybersecurity threat in 2019, Kinsing targeted cloud native infrastructure, such as misconfigured APIs, but the threat actor quickly spread attacks across popular cloud native applications globally. The Nautilus team has been at the forefront of monitoring Kinsing's activities and named the malware in 2020. Nautilus’ work shown in this report provides invaluable intelligence to the cybersecurity community, offering strategies for security teams to better mitigate associated risks. Despite efforts to disrupt its activities, Kinsing continues to evolve and adapt, posing a persistent challenge to organizations worldwide. Nautilus found that on average, honeypots were targeted by Kinsing eight times per day, with figures ranging from three to fifty attacks in a 24-hour period. Other key findings include:
"Kinsing's ongoing campaigns represent its dedication to evolving its operation to add new vulnerabilities and misconfigurations in cloud native environments. This adversary often acts faster than the defenders and demonstrates the clear and present danger to organizations of all sizes," emphasized Assaf Morag, director of threat intelligence for Aqua Nautilus. "Our report serves as a stark reminder of the pervasive risk posed by Kinsing, and implores the cybersecurity community and leaders, such as Aqua, to remain vigilant and united in the face of this threat." Armed with anonymity, Kinsing exploits vulnerabilities or misconfigurations in applications, executes infection scripts, deploys cryptominers often concealed by rootkits, and maintains control over servers using the Kinsing malware. This multi-layered approach further proves the need for robust cybersecurity measures to detect, mitigate, and prevent insidious attacks from the malware. "The depth of detail presented in our report is a testament to our team's longstanding commitment to understanding and combating the threat of Kinsing," said Morag. "Through years of continuous tracking and analysis, we are able to present a more holistic and robust report that provides a comprehensive understanding of Kinsing’s modus operandi and better tools to defend against it." To equip your security team with this new research and recommendations for protection, download the new report first discussed at RSA Conference 2024. About Aqua Nautilus About Aqua Security Contact: |