{"id":110267,"date":"2025-03-12T01:06:33","date_gmt":"2025-03-12T09:06:33","guid":{"rendered":"https:\/\/xira.com\/p\/2025\/03\/12\/hiding-in-plain-sight-cybercriminals-take-advantage-of-u-s-cloud-providers\/"},"modified":"2025-03-12T01:06:33","modified_gmt":"2025-03-12T09:06:33","slug":"hiding-in-plain-sight-cybercriminals-take-advantage-of-u-s-cloud-providers","status":"publish","type":"post","link":"https:\/\/xira.com\/p\/2025\/03\/12\/hiding-in-plain-sight-cybercriminals-take-advantage-of-u-s-cloud-providers\/","title":{"rendered":"Hiding In Plain Sight: Cybercriminals Take Advantage Of U.S. Cloud Providers"},"content":{"rendered":"<figure class=\"wp-block-image alignright is-resized\"><img data-recalc-dims=\"1\" height=\"289\" width=\"620\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/abovethelaw.com\/wp-content\/uploads\/sites\/4\/2022\/12\/cloud-6515064_1920-1-620x289.jpg?resize=620%2C289&#038;ssl=1\" alt=\"\" title=\"\"><figcaption><\/figcaption><\/figure>\n<p><em>Ed. note: This is the latest in the article series,\u00a0<em><strong>Cybersecurity: Tips From the Trenches<\/strong>,<\/em>\u00a0by our friends at\u00a0<a href=\"https:\/\/senseient.com\/\" rel=\"nofollow noopener\" target=\"_blank\">Sensei Enterprises<\/a>, a boutique provider of IT, cybersecurity, and digital forensics services.<\/em><\/p>\n<p>One long-standing cybersecurity measure has been the ability to block malicious threats by Internet Protocol (\u201cIP\u201d) addresses. A public IP address is like your home\u2019s street address on the Internet. It\u2019s a unique number assigned to your internet connection by your service provider, allowing other devices and websites to find and communicate with you online.<\/p>\n<p>Just like your home address lets mail reach your house, a public IP address helps websites, apps, and other online services know where to send data when you browse the internet.<\/p>\n<p>System administrators and cybersecurity professionals used to spend countless hours updating block lists using the originating public IPs of ransomware attackers, spam and phishing senders, malicious websites, and sources of Denial of Service (\u201cDoS\u201d) attacks. Maintaining these lists quickly proved ineffective. Just as soon as an IP address was added, the attacks would continue from a new IP address \u2014 like an internet-based game of Whac-A-Mole.<\/p>\n<p>Facing the frustrations of maintaining these lists, administrators sought to block traffic based on geographical locations by blocking IP addresses leased or located in a particular country or region rather than by one at a time. On the face of it, this seems like a reasonable step to take, mainly when a business operates primarily in the United States and doesn\u2019t likely need to access information or public websites hosted within countries often present on these lists \u2014 for example, North Korea, Iran, Russia, and China.<\/p>\n<p>This approach has also worked reasonably well for law firms, restricting access to resources inside or originating from countries well-known to harbor cybersecurity attackers. An attacker based in China can\u2019t obtain an IP address used or belonging to an Internet Service Provider based in the United Kingdom or European Union, right?<\/p>\n<p><strong>Cyberattackers Adjust Tactics<\/strong><\/p>\n<p>The first significant test to block traffic and malicious attacks based on the geographic location of IP addresses came with the usage of Virtual Private Networks (VPNs), which allows a user to select a VPN server to connect to that will encrypt all internet traffic from the user\u2019s computer to the public internet. Typically, VPN software will allow you to choose a VPN server from your desired location, and any internet traffic is then routed through that country. Luckily, many adverse countries prohibit the usage of VPNs to curb and control free speech, so this evasion technique hasn\u2019t been as widely successful as once thought.<\/p>\n<p>What if cybercriminals could originate their traffic from within the United States \u2014 at will?<\/p>\n<p>That is precisely what cybercriminals have started to do. Rather than originate malicious traffic overseas to attack the U.S. government, businesses, and citizens, which is more likely to be inspected, analyzed, and filtered, cybercriminals based in China and Russia are more frequently funneling their operations through large U.S.-based cloud providers. Amazon Web Services and Microsoft Azure have been targeted to provide services to Chinese front companies, which have been used to attack U.S.-based businesses by hosting fake trading apps, gambling websites, and retail phishing pages. Using U.S.-based infrastructure, cybercriminals can bypass geolocation and IP-based filtering and rent out their infrastructure to other cybercriminals, akin to subletting a spare bedroom in an apartment you are leasing. This practice makes it very difficult to control who is behind the \u201crenting\u201d of Microsoft or Azure\u2019s virtual services. All the activity and internet traffic originating behind a single front company may share the same Public IP address \u2014 and administrators will not start blocking cloud providers. As an added bonus, activating and deactivating cloud virtual services is very quick. This means back actors can \u201cstand up\u201d an evil environment, run it for a short period of time and then tear it down before victims start taking action.<\/p>\n<p>What can be done about these new tactics? Just last year, the U.S. Department of Commerce proposed a rule that would require cloud providers to collect data from customers to determine whether each potential customer is a foreign or U.S. citizen, in addition to reporting any transactions that may allow a foreign entity to train AI models that could be used in malicious cyberactivity. How they will implement this requirement and its effectiveness remains to be seen. We know that cybercriminals constantly adjust to the changing environment and will most likely find a way around any new measures that we implement. It is a never-ending challenge.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n<p><strong><em>Michael C. Maschke (mmaschke@senseient.com) is the President and Chief Executive Officer of Sensei Enterprises, Inc. Mr.Maschke is an EnCase Certified Examiner (EnCE), a Certified Computer Examiner (CCE #744), an AccessData Certified Examiner (ACE), a Certified Ethical Hacker (CEH),\u00a0and a Certified Information Systems Security Professional (CISSP). He is a frequent speaker on IT, cybersecurity, and digital forensics and he has co-authored 14 books published by the American Bar Association.<\/em><\/strong><\/p>\n<p><strong><em>Sharon D. Nelson (snelson@senseient.com) is the co-founder of and consultant to Sensei Enterprises, Inc. She is a past president of the Virginia State Bar, the Fairfax Bar Association, and the Fairfax Law Foundation. She is a co-author of 18 books published by the ABA.<\/em><\/strong><\/p>\n<p><strong><em>John W. Simek (jsimek@senseient.com) is the co-founder of and consultant to Sensei Enterprises, Inc. He is a Certified Information Systems Security Professional (CISSP), a\u00a0Certified Ethical Hacker (CEH), and a nationally known digital forensics expert. He is a co-author of 18 books published by the ABA.<\/em><\/strong><\/p>\n<p>The post <a href=\"https:\/\/abovethelaw.com\/2025\/03\/hiding-in-plain-sight-cybercriminals-take-advantage-of-u-s-cloud-providers\/\" rel=\"nofollow noopener\" target=\"_blank\">Hiding In Plain Sight: Cybercriminals Take Advantage Of U.S. Cloud Providers<\/a> appeared first on <a href=\"https:\/\/abovethelaw.com\/\" rel=\"nofollow noopener\" target=\"_blank\">Above the Law<\/a>.<\/p>\n<figure class=\"wp-block-image alignright is-resized\"><img data-recalc-dims=\"1\" height=\"289\" width=\"620\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/abovethelaw.com\/wp-content\/uploads\/sites\/4\/2022\/12\/cloud-6515064_1920-1-620x289.jpg?resize=620%2C289&#038;ssl=1\" alt=\"\" title=\"\"><figcaption><\/figcaption><\/figure>\n<p><em>Ed. note: This is the latest in the article series,\u00a0<em><strong>Cybersecurity: Tips From the Trenches<\/strong>,<\/em>\u00a0by our friends at\u00a0<a href=\"https:\/\/senseient.com\/\" rel=\"nofollow noopener\" target=\"_blank\">Sensei Enterprises<\/a>, a boutique provider of IT, cybersecurity, and digital forensics services.<\/em><\/p>\n<p>One long-standing cybersecurity measure has been the ability to block malicious threats by Internet Protocol (\u201cIP\u201d) addresses. A public IP address is like your home\u2019s street address on the Internet. It\u2019s a unique number assigned to your internet connection by your service provider, allowing other devices and websites to find and communicate with you online.<\/p>\n<p>Just like your home address lets mail reach your house, a public IP address helps websites, apps, and other online services know where to send data when you browse the internet.<\/p>\n<p>System administrators and cybersecurity professionals used to spend countless hours updating block lists using the originating public IPs of ransomware attackers, spam and phishing senders, malicious websites, and sources of Denial of Service (\u201cDoS\u201d) attacks. Maintaining these lists quickly proved ineffective. Just as soon as an IP address was added, the attacks would continue from a new IP address \u2014 like an internet-based game of Whac-A-Mole.<\/p>\n<p>Facing the frustrations of maintaining these lists, administrators sought to block traffic based on geographical locations by blocking IP addresses leased or located in a particular country or region rather than by one at a time. On the face of it, this seems like a reasonable step to take, mainly when a business operates primarily in the United States and doesn\u2019t likely need to access information or public websites hosted within countries often present on these lists \u2014 for example, North Korea, Iran, Russia, and China.<\/p>\n<p>This approach has also worked reasonably well for law firms, restricting access to resources inside or originating from countries well-known to harbor cybersecurity attackers. An attacker based in China can\u2019t obtain an IP address used or belonging to an Internet Service Provider based in the United Kingdom or European Union, right?<\/p>\n<p><strong>Cyberattackers Adjust Tactics<\/strong><\/p>\n<p>The first significant test to block traffic and malicious attacks based on the geographic location of IP addresses came with the usage of Virtual Private Networks (VPNs), which allows a user to select a VPN server to connect to that will encrypt all internet traffic from the user\u2019s computer to the public internet. Typically, VPN software will allow you to choose a VPN server from your desired location, and any internet traffic is then routed through that country. Luckily, many adverse countries prohibit the usage of VPNs to curb and control free speech, so this evasion technique hasn\u2019t been as widely successful as once thought.<\/p>\n<p>What if cybercriminals could originate their traffic from within the United States \u2014 at will?<\/p>\n<p>That is precisely what cybercriminals have started to do. Rather than originate malicious traffic overseas to attack the U.S. government, businesses, and citizens, which is more likely to be inspected, analyzed, and filtered, cybercriminals based in China and Russia are more frequently funneling their operations through large U.S.-based cloud providers. Amazon Web Services and Microsoft Azure have been targeted to provide services to Chinese front companies, which have been used to attack U.S.-based businesses by hosting fake trading apps, gambling websites, and retail phishing pages. Using U.S.-based infrastructure, cybercriminals can bypass geolocation and IP-based filtering and rent out their infrastructure to other cybercriminals, akin to subletting a spare bedroom in an apartment you are leasing. This practice makes it very difficult to control who is behind the \u201crenting\u201d of Microsoft or Azure\u2019s virtual services. All the activity and internet traffic originating behind a single front company may share the same Public IP address \u2014 and administrators will not start blocking cloud providers. As an added bonus, activating and deactivating cloud virtual services is very quick. This means back actors can \u201cstand up\u201d an evil environment, run it for a short period of time and then tear it down before victims start taking action.<\/p>\n<p>What can be done about these new tactics? Just last year, the U.S. Department of Commerce proposed a rule that would require cloud providers to collect data from customers to determine whether each potential customer is a foreign or U.S. citizen, in addition to reporting any transactions that may allow a foreign entity to train AI models that could be used in malicious cyberactivity. How they will implement this requirement and its effectiveness remains to be seen. We know that cybercriminals constantly adjust to the changing environment and will most likely find a way around any new measures that we implement. It is a never-ending challenge.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n<p><strong><em>Michael C. Maschke (mmaschke@senseient.com) is the President and Chief Executive Officer of Sensei Enterprises, Inc. Mr.Maschke is an EnCase Certified Examiner (EnCE), a Certified Computer Examiner (CCE #744), an AccessData Certified Examiner (ACE), a Certified Ethical Hacker (CEH),\u00a0and a Certified Information Systems Security Professional (CISSP). He is a frequent speaker on IT, cybersecurity, and digital forensics and he has co-authored 14 books published by the American Bar Association.<\/em><\/strong><\/p>\n<p><strong><em>Sharon D. Nelson (snelson@senseient.com) is the co-founder of and consultant to Sensei Enterprises, Inc. She is a past president of the Virginia State Bar, the Fairfax Bar Association, and the Fairfax Law Foundation. She is a co-author of 18 books published by the ABA.<\/em><\/strong><\/p>\n<p><strong><em>John W. Simek (jsimek@senseient.com) is the co-founder of and consultant to Sensei Enterprises, Inc. He is a Certified Information Systems Security Professional (CISSP), a\u00a0Certified Ethical Hacker (CEH), and a nationally known digital forensics expert. He is a co-author of 18 books published by the ABA.<\/em><\/strong><\/p>\n<p>The post <a href=\"https:\/\/abovethelaw.com\/2025\/03\/hiding-in-plain-sight-cybercriminals-take-advantage-of-u-s-cloud-providers\/\" rel=\"nofollow noopener\" target=\"_blank\">Hiding In Plain Sight: Cybercriminals Take Advantage Of U.S. Cloud Providers<\/a> appeared first on <a href=\"https:\/\/abovethelaw.com\/\" rel=\"nofollow noopener\" target=\"_blank\">Above the Law<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ed. note: This is the latest in the article series,\u00a0Cybersecurity: Tips From the Trenches,\u00a0by our friends at\u00a0Sensei Enterprises, a boutique provider of IT, cybersecurity, and digital forensics services. One long-standing cybersecurity measure has been the ability to block malicious threats by Internet Protocol (\u201cIP\u201d) addresses. A public IP address is like your home\u2019s street address [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":110236,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[16],"tags":[],"class_list":["post-110267","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-above_the_law"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/xira.com\/p\/wp-content\/uploads\/2025\/03\/cloud-6515064_1920-1-620x289-tTSMfo.jpeg?fit=620%2C289&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts\/110267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/comments?post=110267"}],"version-history":[{"count":0,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts\/110267\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/media\/110236"}],"wp:attachment":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/media?parent=110267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/categories?post=110267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/tags?post=110267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}