Unmanaged Identities Fuel Cloud Breaches; DDoS Services Dismantled
Cyber Updates - Asher Tamam reports a significant international operation, βPowerOFF,β has dismantled DDoS-for-hire infrastructures across more than 20 countries. This operation seized dozens of domains, identified over 75,000 users, made arrests, and confiscated databases containing millions of records. This is a critical blow to the commoditization of DDoS attacks, making it harder for opportunistic threat actors to launch large-scale disruptions.
Meanwhile, cloud security remains a major weak point. Cyber Updates - Asher Tamam highlights that 68% of cloud breaches in 2024 stemmed from unmanaged service accounts and API keys. Non-human identities are consistently proving to be a primary failure point, offering attackers an often-overlooked vector into critical infrastructure. This trend underscores a fundamental flaw in how many organizations manage their cloud access.
Further, a new Mirai variant, Nexcorium, is actively exploiting vulnerabilities in DVR cameras and TP-Link routers to build DDoS botnets via Telnet and brute-force attacks. This illustrates the persistent threat posed by IoT devices, which remain a fertile ground for botnet recruitment due to widespread insecure configurations and unpatched vulnerabilities. Defenders need to aggressively inventory and secure these edge devices.
What This Means For You
- If your organization relies heavily on cloud services, you need to audit all service accounts and API keys immediately. Assume unmanaged non-human identities are already compromised. Review CloudTrail logs for unusual anonymous S3 access, even for environments previously thought secure. For operational technology (OT) and IoT, check DVRs and TP-Link routers for Mirai (Nexcorium) compromise indicators and ensure Telnet is disabled. Proactive system segmentation and robust identity and access management (IAM) for non-human identities are no longer optional.
π‘οΈ Detection Rules
3 rules Β· 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free β export to any SIEM format via the Intel Bot.
Mirai Nexcorium Botnet Activity via Telnet Brute Force