Amazon S3 Hosts Banking Trojan

In a new post in The Register, researchers at Kaspersky Lab have reported that Amazon’s S3 (Simple Storage Service) has been used to host the command and control channels for the notorious SpyEye banking trojan.

The developers of SpyEye appear to have used new capabilities and Agile software development to prevent the malware from being detected by transaction monitoring services.

This kind of development practice and the availability to shift workloads between cloud instances are sure to keep cloud providers and security companies like Trusteer and Kaspersky Labs on their toes, and is also likely to ask new questions about the governance of workloads hosted in cloud compute environments.

Read the full report on The Register UK here: http://www.theregister.co.uk/2011/07/29/amazon_hosts_spyeye/

Advertisements

About Jeremy Bowman
VMware-certified Solutions Architect, Virtual Systems Designer / Administrator, Mac-Enthusiast.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: