Saturday, March 25, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Chinese 8220 Gang targets public clouds

Chinese 8220 Gang targets public clouds

Radware issued a threat advisory about a for-profit threat group from China called the 8220 Gang, which targets public clouds.


Julide Gamze Cecen Julide Gamze Cecen
January 29, 2023
2 min read
Radware issued a threat advisory

Radware issued a threat advisory about a for-profit threat group from China called the 8220 Gang. The gang, also known as 8220 Mining Group, has rolled into the new year targeting public cloud environments and poorly secured applications, using a custom-built crypto miner and IRC bot.

The 8220 Gang is known to use a variety of tactics and techniques to hide their activities and evade detection. But it is not perfect and was caught attempting to infect one of Radware’s Redis honeypots.

Big picture

According to the soon-to-be-released 2022 Radware Threat Report, Redis was the fourth most scanned and exploited TCP port in Radware’s Global Deception Network in 2022, up from the 10th position in 2021.

Daniel Smith, head of research of cyber threat intelligence at Radware said,

« The threat to cloud environments and insecure applications continues to pose risks to organizations around the world, especially those that use weak credentials or do not patch vulnerabilities immediately. Because of poor security hygiene, low-skilled groups like the 8220 Gang are able to cause a significant impact on targeted systems. »

Why it matters

  • It is not the first time Redis is subject to exploit activity by malicious gangs. Redis gained a lot of popularity among the criminal community in 2022 and is one of the services that should be looked after and not be exposed to the internet if not required.
  • The main objective of the 8220 Gang is to compromise poorly secured cloud servers with a custom-built crypto miner and a Tsunami IRC bot, leaving companies to deal with the fallout:
    • The main concern with crypto mining malware is that it can significantly impact a system’s performance. But it can also expose systems to additional security risks. Once infected, threat actors can use the same access to install other types of malware, such as keyloggers or remote access tools, which can subsequently be leveraged to steal sensitive information, gain unauthorized access to sensitive data, or deploy ransomware and wipers.
    • The Tsunami IRC is a bot used as a backdoor, allowing the threat actors to remotely control systems and launch distributed denial-of-service (DDoS) attacks.
  • Many organizations have limited visibility, making it more difficult for security and network operations to detect and respond to security threats.
  • Public cloud providers offer limited security controls, making it easier for threat actors to find and exploit vulnerabilities.

    See more Cybersecurity News

    A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


    Julide Gamze Cecen

    Julide Gamze Cecen

    Julide is the video editor of Cloud7. Graduated from Marmara University, Faculty of Communication, Department of Cinema, she also studied professional journalism and documentary photography, published news files and photography works in many national and international publications, took roles as coordinator and assistant director in international photography organizations and cinema projects. She taught documentary cinema and documentary photography at universities and academies of fine arts, and worked as an independent documentary director. She worked as an assistant director and editor in children's and youth programs, and directed & edited in serials. Julide also worked as a project consultant and director supported by the European Union, video works of foreign education projects, coordination of promotional shoots, as well as international photography organizations for 6 years. She received awards in national and international categories for her documentary photography works. As an independent filmmaker, she produces screenplays and film projects.

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    I agree to the Terms & Conditions and Privacy Policy.

    Next Post
    Yugabyte Releases YugabyteDB Voyager

    Yugabyte releases YugabyteDB Voyager

    Related News

    7 best practices and tools to use for Linux security

    7 best practices and tools to use for Linux security

    March 24, 2023 5:00 pm
    CISA aims to identify vulnerabilities that attract ransomware

    CISA aims to identify vulnerabilities that attract ransomware

    March 22, 2023 2:10 pm
    7 best cybersecurity schools

    7 best cybersecurity schools

    March 21, 2023 9:00 pm
    Akamai researchers warn about the new HinataBot botnet

    Akamai researchers warn about the new HinataBot botnet

    March 20, 2023 6:10 pm
    Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
    Select list(s):

    Check your inbox or spam folder to confirm your subscription.

    By subscribing, you agree to our
    Copyright Policy and Privacy Policy

    Get the free newsletter

    Subscribe to receive the latest IT business updates straight to your inbox.

    Select list(s):

    Check your inbox or spam folder to confirm your subscription.

    Recent News

    • Podman Desktop – Containers & Kubernetes (Podcast #15 w/ Markus Eisele)
    • What is a Daemon in Linux?
    • 7 best practices and tools to use for Linux security
    • Photopea review: The best free Photoshop alternative for Linux
    • CloudFest 2023 is completed

    Cloud7 News
    Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

    EXPLORE

    • Web Hosting
    • Cloud Computing
    • Data Center
    • Cybersecurity
    • Linux
    • Network/Internet
    • Software
    • Hardware
    • Artificial Intelligence
    • How-Tos
    • Troubleshooting

    RESOURCES

    • Events
    • Interviews
    • Jobs
    • Opinion
    • Whitepapers
    • Podcasts
    • Web Hosting Directory

    Get the Cloud7 Newsletter

    Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

    • About Us
    • Privacy & Policy
    • Copyright Policy
    • Contact

    © 2023, Cloud7 News. All rights reserved.

    No Result
    View All Result
    • Cloud Computing
    • Web Hosting
    • Data Center
    • Linux
    • Cybersecurity
    • More
      • Software
      • Network/Internet
      • Hardware
      • Artificial Intelligence
      • Windows
      • Policy/Legislation
      • Blockchain
      • Troubleshooting
      • How-Tos
      • Articles
    • Events
    • Interviews
    • Jobs
    • Opinion
    • Whitepapers
    • Podcasts
    • Web Hosting Directory

    © 2023, Cloud7 News. All rights reserved.

    Welcome Back!

    Sign In with Facebook
    Sign In with Google
    Sign In with Linked In
    OR

    Login to your account below

    Forgotten Password? Sign Up

    Create New Account!

    Sign Up with Facebook
    Sign Up with Google
    Sign Up with Linked In
    OR

    Fill the forms below to register

    *By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
    All fields are required. Log In

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.