
Top Cloud Malware Attacks Businesses Should Know About
Cloud malware is no longer a theoretical threat that persists in the cloud; it is using traditional security controls and lives in the same approved services.crossed by your teams every day. The techniques that malware is using to deliver exploits through cloud environments are changing quickly and are becoming increasingly untraceable.
Knowing how to protect your data from malware is not just good information; it is essential information that can be the difference between securing your operation and a catastrophic breach of sensitive data.
One of the most prevalent attackis to upload dangerous files to reputable and known cloud storage services; including Google Drive, Dropbox, or Microsoft OneDrive; none of which receive the same level of security scrutiny as email. Cloud storage services do not require the traditional context of personal trust; they are inherently trusted by the users of the service.
The danger is when those infected files are shared internally, amongst users, or externally with clients and partners. One document shared Ida file that has malware and is shared through your trusted cloud RFID cloud storage service can rapidly spread through the entirety of your organization, especially if your users are downloading and executing files without any validation.
Most typical Halbumn security toolset region bind Found are usually overly stretched and unable to detect threats commingling in these environments because these platforms are perceived as trusted environments. Too many security solutions do not put the same effort into scanning files in the cloud that they put into scanning files that are email attachments or downloads from dubious sites.
What you need to do is implement a comprehensive scanning solution that is designed specifically for cloud storage platforms that can detect suspicious content during the upload process and avoid spreading malicious files around your organization.
Phishing campaigns aimed straight at cloud service credentials have evolved to be extremely sophisticated. Attackers create incredibly convincing fake log-in webpages, that mimic popular services like Office 365, Google Workspace, or Salesforce, leading employees to enter their username and password into the attacker controlled webpages.
Once the attacker gets the stolen credentials, they can access your cloud accounts with no security alerts that would typically trigger for traditional security. The attacker can then use the information for many pernicious purposes – install malware, steal sensitive documentation, access communications between users, or even act as an authenticated user to launch attacks on other systems.
These attacks provide great appeal to cybercriminals because the activity looks to external observers as if it is legitimate activity by a legitimate user. Standard security monitoring is unlikely to flag fallback activity suspicious because it is likely coming from an authenticated user with permission to access the data.
So, yes, in addition to cyberattack exploitation of business communications and sensitive information of a business, when an attacker can get to the credentials and gain access to cloud-based systems they are likely in and permitted because they are (alternatively) logged into your cloud accounts!
Multi-factor authentication is your best defense against credential based attacks. Even if they get your password, they will still need access to the second authentication process for log-in to their victim's system!
Fileless malware is one of the more aggregated and sophisticated threats to cloud environments. As opposed to conventional executable files, these attacks run fully in system memory utilizing legitimate system tools and processes to execute malicious actions.
In cloud environments, fileless attacks often exploit PowerShell scripts, Windows Management Instrumentation, or other administrative tools that are built-in to the system to run malicious code. Consequently, these scripts can remain undetected for long periods without leaving the conventional file signatures that antivirus usually looks for.
Traditional antivirus solutions struggle significantly with fileless threats because there are no malicious files to scan. Furthermore, because the attacks run using legitimate system processes and tools, active detection will be extremely challenging with signature security-based forms of protection.
Defense against fileless threats will require functionality for behavioral monitoring combined with threat intelligence that allows for risk patterns and behavioral anomalies, rather than just using file-based detection. Functionalities like behavioral monitoring can analyze system behavior to see when legitimate tools are being used maliciously.
Software-as-a-Service integrations have created another attack vector that many organizations do not consider. Attackers create an application that looks legitimate and asks for OAuth permissions or other forms of integration access to popular platforms such as Slack, Microsoft Teams, or Google Workspace.
Once a user accepts the integration, the attacker can gain access using the application's permissions without direct credential theft. The attacker could read emails, access files, read communications, or simply abuse the integration to get malicious software into the organization's environment.
These attacks are particularly effective because malicious applications are often presented professionally, requesting reasonable permissions that look acceptable. For example, a user may not realize that by allowing an integration, they are granting access to an attacker, which then enables the attacker to operate in their cloud environment using real application credentials.
Regularly reviewing authorized SaaS integrations should be included in the organization's standard security measures. Additionally, organizations should audit what applications have permission to access their systems, those permissions, and if the integrations are still needed and trusted.
Cloud malware has progressed from being a niche concern to being a serious threat that affects small and large businesses. From fileless attacks that hide in plain sight to compromised SaaS integrations that are abusing legitimate permissions, cybercriminals are finding cunning means of infiltrating cloud environments.
The solution to protection is remaining alert, educating your team on emerging threats, and implementing advanced security tools that are specifically built for cloud platforms. Understanding the threats and putting measures in place to limit exposure will help businesses proactively protect their resources and maintain their operational continuity.
TIME BUSINESS NEWS

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Tom's Guide
5 hours ago
- Tom's Guide
I replaced my laptop with the Galaxy Z Fold 7 — here's what happened
There is a lot to love about some of the best foldable phones, but there's no denying that they're pricey. That goes double for the Samsung Galaxy Z Fold 7, which costs a whopping $2,000. That's more than some of the best laptops, so you would hope that it could replace them, right? In concept, it should be possible to replace your laptop with a Samsung phone thanks to Samsung DeX. If you've never heard of DeX, it essentially allows you to connect your phone with an external display like a monitor or TV, essentially turning your phone into a mini PC. I've never tried the feature, so I thought I would try replacing my work laptop for a day to see how it all worked out. Here are some of the ground rules I set myself: I would try the phone with both a connected keyboard and mouse, and without them to see which is ideal. I also made sure to write at least one piece of news while using the feature; in this case, it was a story about the Galaxy S26 Ultra reusing the same battery as last year's Galaxy S25 Ultra. So, with my parameters set, let's get into how my morning went. Spoiler: it wasn't great. Honestly, setting up the phone with my monitor was amazingly easy, as I only really had to connect the phone. In my case, I have a pretty ancient monitor, so I needed a USB-C hub with an HDMI connection, which also has USB ports for the keyboard and mouse. All I needed to do was plug them all in and I was good to go. Saying that, I did have one issue. For the most part, I had to use the app versions of certain services like Slack and Google Drive. This led to some complications, primarily with the layout of Slack and the ease of sharing documents via Google Drive. Admittedly, this was more down to my own developed habits, rather than a major issue with Samsung DeX. I can only imagine that this would get easier throughout the morning, and it did. Unfortunately, I had more issues when it came to actually using the phone for my task. Initially, there was no real problem, but the minute I ditched my USB keyboard and mouse, I hit a real wall. Get instant access to breaking news, the hottest reviews, great deals and helpful tips. When it comes to using the phone as a mouse, it technically makes sense. Essentially, you can use the entire screen, which is separated into four quadrants. You can move your finger and tap where you please, and the screen can be split so that you can use the keyboard as well. However, the phone can only really face one way when you try to use it as a mouse. So if the phone is facing a different way, and you move your finger right, the cursor will go down instead. The only indication you have is the small buttons on the side, which are easy to miss when you're looking at the larger screen. Once I figured out the mouse, it was down to figuring out the keyboard and wow, does the keyboard suck. If you have never used the Samsung keyboard before, let me paint you a picture of how it looks. You have your basic QWERTY layout, but with a large gap down the middle that also cuts the space bar in half. Then, below that is the bar that contains all your quick navigation tools. Now, despite the Galaxy Z Fold 7 being bigger than the Galaxy Z Fold 6, this is not a keyboard that you can comfortably use, unless you have a doll's hands. There's no touch typing here; instead, I found myself using two fingers to slowly press the keys like your tech-illiterate aunt. Not only is it uncomfortable to use, but the placement of the navigation buttons becomes a real nightmare. I constantly found myself slowly getting into a flow when it came to typing, only to accidentally brush the home button and lose the keyboard. To say it was infuriating is an understatement. Another problem that soon appeared had to do with just how much battery the phone consumed in this mode. Now, my USB hub does have a charging port, but I found that my phone was constantly losing battery, even when the charger was attached to the hub. In the end, I had to constantly disconnect the phone and charge it for a time, which took up more of my morning than I would like. Speaking of the port, there is a bit of an issue with where it is placed and what that means for balance. In my experience using the Z Fold 7, I found the best way to set it up on the desk was in the L shape, as it allowed me to type without overshooting as much and hitting the mouse section of the screen. However, to make sure the phone was balanced, I needed to place the camera side up, and that side of the phone is also where the USB-C port is. So, I had to choose between either a wobbly keyboard by having the cameras on the table, or suffer a constant threat of the phone tipping over. Here's the thing: using the Galaxy Z Fold 7 as a PC is entirely possible with Samsung DeX, so long as you have a Keyboard and mouse. However, this is where my biggest issue with the idea rears its ugly head. In reality, if I have to carry the phone, keyboard and mouse, then I might as well use a laptop instead. After all, they come with all of these things included, as well as the browser versions of the apps. As such, I think this is a feature that you'll use to watch YouTube on your bigger TV, which, let's be honest, the best smart TVs can do better. It has its purpose, but you shouldn't buy one for that reason alone. However, I am always happy to hear other people's opinions, so let me know if you're a stalwart DeX user, or if you tried it and hated it. Follow Tom's Guide on Google News to get our up-to-date news, how-tos, and reviews in your feeds. Make sure to click the Follow button.

Business Insider
a day ago
- Business Insider
Scams, forgotten passwords, and lost fortunes: Meet the digital locksmith who helps people get their bitcoin back
Crypto prices are surging, and so are cases of lost crypto keys and crypto scams. Crypto recovery specialist Julia Burlingham is seeing a business boom as a result. Here's what happens if you lose access to your crypto wallet. Forgetting your Instagram password is annoying. Forgetting your crypto wallet password could be devastating. Crypto owners don't have the luxury of emailing themselves a password reset link if they're locked out of their self-custody wallet. It's an issue that's becoming bigger as bitcoin and other cryptos surge in price and crypto holders scramble to retrieve previously abandoned wallets. For Julia Burlingham, who owns the business Professional Crypto Recovery, business is booming. "When the price of bitcoin goes up, my phone rings all day," Burlingham told Business Insider. Burlingham started her business five years ago, after helping her brother recover his dogecoin during the memecoin's heyday. According to Burlingham, she was able to unlock his wallet, where an initial $300 investment had grown to $6,000. She's seen it all, from people who inherit locked crypto wallets to those who have misplaced their seed phrase. Here's what it's like inside the world of crypto recovery. How does crypto storage work? There are two main ways of holding crypto: on an exchange like Coinbase, or through self-custody using your own crypto wallet. While self-custody provides more control and privacy, the responsibility of securing the wallet lies in — as the name implies — yourself. Setting up a self-custody wallet generates a seed phrase of 12 or 24 random words that encodes your private key. People often write the seed phrase down with pen and paper, according to Jess Houlgrave, CEO at the digital asset startup Reown. Issues arise when that slip of paper isn't stored securely. "As soon as you're in the self-custodial realm, you need to be able to store and recover your seed phrase in order to be able to use the assets," Houlgrave told Business Insider. She's also seen people store their passkeys on Google Drive or password managers, which Houlgrave doesn't recommend, as those methods are susceptible to being hacked. Both Houlgrave and Burlingham mentioned that the LA wildfires earlier this year resulted in many people losing their seed phrases when their homes burned down. Last year, Reuters reported that some wallet recovery services saw requests for their services more than triple when bitcoin rose to $70,000. Now, with bitcoin prices firmly in six-figure territory, the stakes are even higher. A day in the life of a crypto locksmith Burlingham helps people with issues such as forgotten passwords, partial seed phrases, corrupted wallet files, or old wallets that no longer sync with the blockchains. Her clients range from original bitcoin investors who bought over a decade ago to people who just set up their accounts recently and suddenly lost access. "Depending on the wallet, sometimes you can brute force it," Burlingham said. It helps if you remember fragments of a password or seed phrase. "I'll ask for password clues and how they typically make their passwords," Burlingham added. Using specialized supercomputers with high GPU and CPU power, Burlingham runs password recovery tools that test millions of combinations. Because wallets and private keys are highly sensitive, she runs them on air-gapped computers, or machines that aren't connected to the internet. Burlingham also helps those who have been scammed of their crypto, a growing problem. According to a report by Chainalysis, more than $2 billion was stolen from cryptocurrency services already in 2025, surpassing the total for all of 2024. The recovery process can take months. One case that Burlingham started in November of last year took until this April to finish. Recovering crypto is also an energy intensive endeavor. "It's really high," Burlingham said of her electricity bill. "You have to have cooling systems because these machines produce a lot of heat." Lost crypto Unfortunately, sometimes, nothing can be done to recover the crypto. According to crypto wallet provider Ledger, it's estimated that between two and four million bitcoins are permanently lost. James Howell is an infamous example of this unlucky outcome — the IT worker accidentally threw away a hard drive containing 8,000 bitcoins back in 2013. In the case of crypto, an ounce of prevention is worth a pound — or several — of cure. Make multiple copies of your seed phrase and putting them into secure physical locations, such as a locked safe or bank vault, Burlingham recommends. And it may sound simple, but avoiding phishing links and keeping your seed phrase private are steps that many people still overlook.


Forbes
2 days ago
- Forbes
How Virtual Testing Environments Are Unlocking Enterprise AI Agent Adoption
Olga Megorskaya is Founder & CEO of Toloka AI, a high-quality data partner for all stages of AI development. AI agents are having a moment. From customer service automation to complex workflow orchestration, these systems promise to revolutionize how enterprises operate. Yet despite the hype, actual deployment remains frustratingly limited. The reason? Safety risks are simply too high for most organizations to stomach. Unlike traditional AI models that respond to prompts in isolation, AI agents perform sequences of actions across multiple systems—accessing databases, modifying files, interacting with APIs and making decisions that cascade through entire business processes. When an agent malfunctions in a production environment, the potential consequences include operational disruptions, security breaches, compliance violations and reputational damage. The solution isn't to restrict AI agents—it's to test them properly before deployment. Enter agentic environments: realistic virtual spaces that mirror your actual business operations, allowing you to stress-test agents without risking your real systems. The Enterprise Safety Paradox Here's the challenge enterprise leaders face: AI agents must interact with real tools and data to be effective, but testing them in production environments is unacceptably risky. A customer service agent who accidentally exposes PII, a workflow automation that corrupts financial records or a research assistant who inadvertently violates compliance protocols can cause immediate, tangible damage. Traditional testing approaches fall short because they can't capture the complexity of real enterprise environments. Sandbox testing with dummy data doesn't reveal how agents behave when faced with the messy realities of actual business operations, like incomplete datasets, legacy system quirks or the subtle contextual cues that guide human decision making. This creates a deployment deadlock. Organizations need to see agents perform in realistic conditions to build confidence, but they can't afford the risks of letting unproven agents loose on production systems. What Are Agentic Environments? Agentic environments solve this paradox by creating high-fidelity digital twins of real business operations. These aren't simple testing sandboxes; they're comprehensive virtual organizations, complete with realistic data, workflows and system integrations. Leading organizations are now implementing sophisticated virtual companies that serve as testing grounds for enterprise AI agents. These environments typically include fully functional instances of Google Workspace, Confluence, Salesforce CRM, Jira, GitHub and Slack, along with virtual employees, department structures and ongoing projects. These environments can be customized to match specific industry requirements or integrate proprietary tools, allowing them to safely validate AI agent performance before real-world deployment. The value of this approach has become clear as companies are using these virtual environments to test agents before launch. Realistic environments reveal critical vulnerabilities that would be invisible in traditional testing scenarios—issues that could compromise data security or cause system failures in production. By identifying and addressing these problems in virtual environments, organizations prevent what could be costly deployment failures. To build these virtual environments, data companies are employing real human experts to generate realistic scenarios that reflect the nuanced decision making and complex interactions agents will encounter in actual business operations. The key to success is realism. Rather than testing agents with sanitized, artificial scenarios, these environments present the complexity agents will encounter in production: conflicting information across systems, incomplete data sets, varying user permissions and the kind of edge cases that only emerge in real-world operations. Beyond Basic Testing: Agent-Oriented Benchmarks This focus on realistic testing has driven the development of sophisticated agent-oriented benchmarks. SWE-bench tests coding agents in structured development environments, while TAU-bench evaluates agents in retail and airline scenarios where they must navigate complex, domain-specific rules while interacting with both humans and APIs over extended periods. What makes these benchmarks valuable for enterprise deployment isn't just their technical rigor—it's their emphasis on real-world conditions. Human insight remains essential for creating benchmarks that address customers' unique operational requirements and designing realistic scenarios that reflect actual business complexities. These benchmarks test whether agents can maintain performance across millions of interactions, follow nuanced compliance requirements and handle the kind of ambiguous situations that human workers navigate daily. Enterprise teams are increasingly requesting custom versions of these benchmarks tailored to their specific industries and use cases. The demand signals that disruptive technologies require brand-new testing approaches. Security Implications From a security perspective, agentic environments are essential for identifying potential vulnerabilities before deployment. Agents that can modify files, access databases and interact with external APIs represent significant attack surfaces. Testing in isolated environments allows security teams to observe agent behavior under various conditions, including adversarial scenarios designed to exploit potential weaknesses. These environments also enable red team exercises where security professionals can attempt to manipulate agents into performing unauthorized actions or accessing restricted data. Better to discover these vulnerabilities in a controlled setting than after deployment. The Path Forward Using realistic testing environments enables organizations to build the confidence needed to deploy agents safely and effectively. Companies that establish robust agentic environments now will be positioned to take advantage of future advances while maintaining the safety and reliability their operations demand. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?