Cloud service providers are a tempting target for hackers because they offer a way around the heavy-duty security systems used by larger organization. The security firm Trusteer has found Zeus-based malware that focuses on cloud payroll service providers and routes funds to criminals. Trusteer reports: “Our researchers have captured a Zeus configuration that targets Ceridian, a Canadian human resources and payroll solutions provider. In this attack, Zeus captures a screenshot of a Ceridian payroll services web page (https://clients.powerpay.ca/powerpay/Logon*) when a corporate user whose machine is infected with the Trojan visits this website. This allows Zeus to steal the user id, password, company number and the icon selected by the user for the image-based authentication system.” The potential payoff for criminals here is huge because it allows them to operate on wholesale rather than retail level, stealing from masses of people instead of individuals. In August of last year, crooks stole $217,000 from the Metropolitan Entertainment & Convention Authority in Omaha, Neb. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Cloud service providers are a tempting target because they offer a way around the heavy-duty security systems used by larger organization. The service’s customers have no control over the provider’s IT systems and don’t have any way to directly monitor security. Cloud services in general appeal to the bad guys because they can be accessed using unmanaged devices which are usually less secure and easier to infect with malware. As Trusteer’s Amit Klein notes, “Attacks like this one are surgical in nature and use targeted reconnaissance combined with signature detection evasion techniques to get a foothold inside corporate computers.” Because they are so unique the usual antivirus systems don’t detect and stop them. One solution would be not using cloud-based systems. But we all know that ain’t happening. Those systems do some really, really useful stuff. Instead, IT security folks need to make sure management knows of this risk and provides you with resources to monitor all service providers’ security. Related content opinion Why Bitcoins are Just as Viable as Any Other Currency The true value of any currency is a reflection of how much people believe it's worth, according to CIO blogger Constantine von Hoffman. But it's wise to remember just how fast beliefs can change. By Constantine von Hoffman Apr 15, 2013 4 mins Government Technology Industry opinion No Surprise: Docs Show Obama Administration Lying About Drones President Obama has repeatedly said drones would only be used against members of al Qaida and allied groups. However, leaked intelligence documents show the administration has been using them to settle political and tribal feuds for at least four yea By Constantine von Hoffman Apr 10, 2013 3 mins Regulation Government opinion How Big Data Can Quickly Become Big Garbage The bigger the data the bigger the chance of mistakes or inaccuracies. In that vein, a large database used by retailers to screen people accused of stealing from employers is identifying innocent people and could result in major lawsuits, according t By Constantine von Hoffman Apr 04, 2013 2 mins Big Data opinion Why Crazy Trumps Logic on the Internet The earth is flat. Vaccines cause autism. 9/11 was a government conspiracy. These are just a few of the many ideas that continue to find adherents online despite overwhelming proof that they're not based on fact. CIO.com blogger Constantine von By Constantine von Hoffman Apr 02, 2013 3 mins Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe