Which cloud technology attack method would require the threat actor to create a malicious application and install it into a SaaS, PaaS, or IaaS environment?

IT Questions BankCategory: Ethical HackerWhich cloud technology attack method would require the threat actor to create a malicious application and install it into a SaaS, PaaS, or IaaS environment?

Which cloud technology attack method would require the threat actor to create a malicious application and install it into a SaaS, PaaS, or IaaS environment?

  • resource exhaustion attack
  • account takeover
  • metadata service attack
  • cloud malware injection attack

Explanation: In a cloud malware injection attack, the attacker creates a malicious application and injects it into a SaaS, PaaS, or IaaS environment. Once the malware injection is completed, the malware is executed as one of the valid instances running in the cloud infrastructure. Subsequently, the attacker can leverage this foothold to launch additional attacks, such as covert channels, backdoors, eavesdropping, data manipulation, and data theft.

Exam with this question: 7.3.3 Quiz - Cloud, Mobile, and IoT Security Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments