How much do you trust your cloud? Pirates use weakness to target customers – here is what we know


  • Chinese pirates have found a unique way to target American companies
  • The method has been widely hidden so far
  • Pirates are mainly interested in espionage, assert experts

Chinese threat actors known as the troubled panda abuse the confidence that companies have in their cloud suppliers to enter businesses, steal sensitive files and maintain persistence for additional recognition and espionage.

Crowdsstrike safety researchers have revealed how, since 2023, they have seen at least two cases in which a troubled panda has exploited zero faults to enter the cloud environment of SaaS suppliers.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top