Detecting Focused Assaults on Public Cloud Companies with Cisco Safe Cloud Analytics

The Public Cloud and Safety Duty

Throughout many companies, leveraging companies provided and hosted by public cloud suppliers resembling AWS proves to be extraordinarily advantageous for each enhancing operational efficiencies, value financial savings, scaling, and for safety.

For AWS prospects, Lambda capabilities are an ideal instance of this benefit in offering a helpful strategy to execute solely the code it is advisable to execute when it is advisable to execute it, saving companies cash on internet hosting prices and lowering operational overhead.  This permits prospects to scale to their wants and solely pay for what they should run their duties and functions that drive their enterprise.

One other enterprise profit is with safety.  The infrastructure safety for working these companies is roofed by the cloud supplier, which implies much less overhead and fear for the enterprise utilizing these companies.  Nevertheless, this doesn’t imply prospects of public cloud suppliers have zero safety accountability.  Per the shared accountability mannequin from AWS, prospects are nonetheless chargeable for safety within the cloud.

Enter Denonia

Denonia is a cryptocurrency mining software program that’s particularly designed to run on AWS Lambda, lately found by Cado Safety on April sixth, 2022. It’s seemingly that Denonia has been working previous to this date, so regulate your investigations accordingly.

In response to Cado, the software program may very well be delivered by leveraging DNS over HTTPS to keep away from detection on the community entry layer and utilizing compromised credentials to execute the software program designed for Lambda environments.

Within the case of this software program focusing on AWS Lambda, prospects are chargeable for securing the capabilities themselves together with who and what has entry, community connections, and securing the code that runs on the capabilities.

Analyzing Denonia

Our analysis group at Cisco Talos examined the Denonia package deal utilizing a Lambda Perform in our lab. Upon executing we monitored AWS CloudWatch Logs and habits in Safe Cloud Analytics, we seen a number of attention-grabbing insights about the way it capabilities:

  • A number of console log messages that resembled HTTP GET requests have been logged to numerous domains with spoofed consumer brokers together with that of the Baidu internet spider, bot, and Android 4.1.2 browser.
  • Working the strings command on the malware binary exhibits that these system log messages are arduous coded within the binary, together with the HTTP response codes, and are apparently printed to the console upon execution.
  • We discovered console log messages printed by XMRig, an instance of which might be time=”2022-04-13T16:20:44Z” stage=information msg=”Person [14.705882], System [0.000000], Idle [85.294118]”

  • As soon as we up to date the Lambda to make use of a VPC in our check lab, the operate exited with standing 1, and the logs confirmed an error “panic: doh: all question failed”. This doubtlessly signifies that DNS over HTTPS was not supported both by the Lambda or the VPC.
  • We discovered related outcomes to above when examined on EC2 with root privileges and utilizing lamb-ci’s Docker Lambda undertaking to run the Lambda surroundings domestically in Docker containers, Denonia was efficiently executed.

To this point, there haven’t been any identified profitable deployments, however they key takeaway is attackers are focusing on particular sources from cloud suppliers and changing into growing subtle within the public cloud, so this simply would be the begin of focused assaults on serverless capabilities and different public cloud companies

Steady Monitoring and Menace Detection within the Public Cloud utilizing Cisco Safe Cloud Analytics

Cisco Safe Cloud Analytics is a SaaS based mostly safety product that gives broad visibility and detection inside public cloud companies throughout AWS, Azure, and GCP leveraging APIs and logs from the suppliers, all with out deployment of brokers.

When taking a look at Denonia as a possible assault focusing on companies and functions working within the public cloud, Safe Cloud Analytics gives a wide selection of detection capabilities to see an assault at many phases of its lifecycle.

Working with our analysis group at Cisco Talos, we now have recognized a number of strategies for detecting Denonia and assaults prefer it within the public cloud utilizing Safe Cloud Analytics.

With Safe Cloud Analytics deep potential to baseline regular habits, habits seen by Denonia or different software program or malware that triggers an unusually massive variety of Lambda capabilities will set off the alert “AWS Lambda Invocation Spike” as a result of sometimes brief default timeouts of a Lambda operate and the necessity for a lot of of these sources to leverage the capabilities to execute the assault and leverage the sources for the aim.

Moreover, if gadgets join with a identified dangerous area or IP from Denonia, Safe Cloud Analytics will set off a ““Talos Intelligence Watchlist Hits” alert which signifies a tool on the community communicated with a identified dangerous area or IP from Cisco Talos.  Area or IP matching isn’t at all times assured in instances like Denonia the place DNS over HTTPS is used, subsequently it’s vital to take a look at malicious habits along with identified IOCs for full visibility and detection functionality.


  • denonia[.]xyz
  • ctrl.denonia[.]xyz
  • gw.denonia[.]xyz
  • www.denonia[.]xyz
  • xyz.denonia[.]xyz
  • mlcpugw.denonia[.]xyz

IP Addresses:

  • 116.203.4[.]0
  • 162.55.241[.]99
  • 148.251.77[.]55

Additional our researchers indicated different widespread attacker strategies could also be seen with the wealthy behavioral visibility of Safe Cloud Analytics within the public cloud which may be correlated with the above discovering for Denonia or different like threats.

“New AWS Area” alert which can be utilized to detect protection evasion focusing on unused areas.

“Geographically Uncommon AWS API Utilization” alert which might spotlight preliminary entry by means of legitimate identification and entry administration accounts.

“AWS Mulifactor Authentication Change” alert which might establish disabling MFA.

“AWS Short-term Token Persistence” alert which identifies short-term tokens created by different short-term credentials.

Though the above alerts are particular to AWS, we now have expanded our protection to different widespread cloud suppliers resembling Azure and GCP as buyer utilization has grown for related detection outcomes.

Along with public cloud particular detection, Safe Cloud Analytics presents a variety of menace detection throughout a company’s personal community, all inside a single pane of glass.

Shield Your Public Cloud At present

To study extra, go to and begin a free threat free 60 day trial.

For extra updated menace data, comply with the Cisco Talos weblog, together with different current threats focusing on the general public cloud by TeamTNT.


We’d love to listen to what you suppose. Ask a Query, Remark Beneath, and Keep Linked with Cisco Safe on social!

Cisco Safe Social Channels




Related Articles

Back to top button