|
|
|
|
|
|
|
Cloud account theft
Identity theft is a threat to the cloud that steals user account credentials. By accessing personal data, the criminal can impersonate an authentic user and cause not only financial but also reputational damage to the victim. The multiple possibilities of identity theft in the cloud require special attention. Identity theft can occur in a wide variety of moments by accessing the victim’s phone, computer, social media, e-mail, online banking,…
There are several means that attackers can use to hijack accounts, including:
Forwarding users to an unsecure website to steal their information or hijack their session ID
|
|
|
Leading the user to install malware that will facilitate the capture or access to the cloud account.
|
|
|
By using brute force, the attackers can find or guess your password, if your password isn’t strong. In this scenario, the use of multi-factor authentication is essential.
|
|
|
4. Attack to Cloud Service
|
You must check the maturity and reliability level of your Cloud provider, because there’s a multitude of direct attacks to Cloud services that can allow attackers to steal the identity of users.
|
|
|
5. Man-in-the-middle Attacks
|
The typical attacks where the connection is somehow intercepted and used by attackers to get access or hijack the account. A classic example is when we use unsecured wireless networks.
|
|
|
|
|
|
|
|
How can you protect yourself against identity theft in the cloud?
|
|
Firstly, you should create secure passwords and change them frequently. •This will help you stay protected against attacks. Also consider the use of multi-factor authentication (MFA) whenever possible, which will add an extra security layer, making it hard for attackers to access your account remotely.
|
|
Many successful account intrusion attempts happen due to phishing. Be careful when you click on Internet and e-mail links and when you receive password reset requests, and this will help protecting you against attacks. If you have any employees using cloud services, make sure that you inform them about the vulnerabilities of cloud computing so that they know how to identify account intrusion attempts.
|
|
Seeking advice from an expert on threat and vulnerability detection •is also an effective way to prevent account hijacking. They can look for potential vulnerabilities in your network and introduce controls that will you’re your data better protected against these types of attack.
|
|
|
|