February 26, 2020 By David Bisson 2 min read

Security researchers discovered a new attack they’re calling “Cloud Snooper” that uses innocent-looking requests to bypass the rules of many, if not most, firewalls.

SophosLabs launched an investigation into the Cloud Snooper campaign when it discovered an anomaly. Specifically, it found that a compromised Linux system with Amazon Web Services (AWS) security groups tuned only for inbound HTTP and HTTPS traffic was still listening for inbound connections on ports 2080/TCP and 2053/TCP. A closer look revealed a rootkit that helped attackers communicate with a backdoor.

Researchers at the security firm analyzed this activity and observed that the attackers had sent innocent-looking requests to the web server via other normal web servers in an attempt to avoid detection by a firewall. A listener picked up on those requests before they reached the web server and then sent a “reconstructed” command to the backdoor for the purpose of stealing sensitive data. The rootkit then disguised its communication once again to exfiltrate the information and ultimately send it back to a command-and-control (C&C) server operated by the attackers.

Firewall Bypasses A-Plenty

Cloud Snooper is not the first attack in which malicious actors have attempted to bypass firewall rules. Back in 2017, for instance, Microsoft warned of a new technique in which the PLATINUM group abused Intel’s Active Management Technology to bypass firewalls and other endpoint-based network monitoring tools.

In February 2018, NewSky Security spotted the DoubleDoor internet of things (IoT) botnet using two backdoor exploits to evade detection by a firewall. More recently, in August 2019, Proofpoint observed the SystemBC malware creating proxies on infected computers, paving the way for other malware payloads to bypass firewalls and similar tools.

How to Defend Against the Cloud Snooper Attack

To combat campaigns such as the Cloud Snooper attack described here, security professionals should start by investing in tools that can analyze network traffic in real time. This visibility is crucial for detecting unapproved devices as well as potential exfiltration of sensitive data. Additionally, infosec personnel should make sure their network’s “crown jewels” are configured to generate alerts individually so they can watch for anomalous behavior.

More from

ONCD releases 2024 Report on the Cybersecurity Posture of the U.S.

4 min read - On May 7, the Office of the National Cyber Director (ONCD) released the 2024 Report on the Cybersecurity Posture of the United States. This new document is a report card on how well cyber policy followed the guidelines set by the National Cybersecurity Strategy, introduced in March 2023. Here’s what you need to know about the newly released report. Fundamental shifts in cyber roles Over the past year, the U.S. national cybersecurity posture was driven by the 2023 National Cybersecurity…

CISA wants private industry to publicly commit to Secure by Design

4 min read - The tech industry has the power to protect the world from nation-state threat attacks, cyber crime and those wanting to compromise data and manipulate critical infrastructure. But with this power comes great responsibility, which, to be honest, the tech industry has not been that interested in holding. But at the RSA Conference (RSAC) in San Francisco, the cybersecurity and tech communities took steps to exert some power and take responsibility. They took the Secure by Design pledge, a promise to…

Change Healthcare discloses $22M ransomware payment

3 min read - UnitedHealth Group CEO Andrew Witty found himself answering questions in front of Congress on May 1 regarding the Change Healthcare ransomware attack that occurred in February. During the hearing, he admitted that his organization paid the attacker's ransomware request. It has been reported that the hacker organization BlackCat, also known as ALPHV, received a payment of $22 million via Bitcoin.Even though they made the ransomware payment, Witty shared that Change Healthcare did not get its data back. This is a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today