Latest cloud and cybersecurity expo publications
The lift-and-shift method of cloud adoption has also contributed to the number of security vendors engaged by a business. Often, when an application was migrated to the cloud, the security solution was migrated alongside the application that it served on-premise. It can be difficult to dedicate resources to evaluating solutions that are already in place.
After analysis, MSTIC reports that while the malware is designed to look like ransomware, it does not have a ransom recovery mechanism. MSTIC now believe the malware was created to make the targeted devices unusable.