Amazon S3 Hosts Banking Trojan

In a new post in The Register, researchers at Kaspersky Lab have reported that Amazon’s S3 (Simple Storage Service) has been used to host the command and control channels for the notorious SpyEye banking trojan.

The developers of SpyEye appear to have used new capabilities and Agile software development to prevent the malware from being detected by transaction monitoring services.

This kind of development practice and the availability to shift workloads between cloud instances are sure to keep cloud providers and security companies like Trusteer and Kaspersky Labs on their toes, and is also likely to ask new questions about the governance of workloads hosted in cloud compute environments.

Read the full report on The Register UK here: http://www.theregister.co.uk/2011/07/29/amazon_hosts_spyeye/