Illustration of different coloured cloud icons|||

Double-Edged Sword: How Attackers Use the Same Cloud Infrastructure We Rely On

Photo of Sousan Tarahomi
Categories:

In short

  • Malicious actors are increasingly favoring partial use of cloud services rather than fully migrating their infrastructure.
  • This diversity makes abuse harder to detect and mitigate.
  • Security efforts should focus not only on fully cloud-hosted systems, but also on partial and mixed infrastructures.

Cloud computing is a foundational component of today’s Internet, enabling services to scale quickly and operate at low cost. These advantages have also made cloud platforms attractive to cybercriminals.

Recently, my colleagues and I used DNS data from OpenINTEL, cloud classification from IP2Location, and a curated ground-truth list of five market-leading cloud providers to investigate how attackers use cloud services and how this differs from typical usage patterns.

We examined three essential components of domain infrastructure, web hosting, DNS, and email, to understand not just where malicious content is hosted, but how attackers assemble their infrastructure.

Our findings suggest that cloud platforms are being used in increasingly selective and strategic ways, posing new challenges for Internet security and policy.

A Shift Toward Partial Cloud Usage

One of our key findings is that malicious actors are increasingly favoring partial use of cloud services rather than fully migrating their infrastructure. 

To understand how malicious infrastructure has shifted over time, we compared cloud usage patterns in 2021 and 2025 for both general and blocked domains. We focused on .com because it is the most widely used and an inexpensive top-level domain, making it common for both benign and malicious use.  

Figure 1 shows that while overall cloud adoption across general domains has remained relatively stable, there is a shift toward partial cloud use rather than full-stack cloud deployment. This trend is particularly pronounced for blocked domains as attackers increasingly rely on cloud services mainly for web hosting. At the same time, the share of blocked domains using fully cloud-based infrastructure has dropped sharply, suggesting a growing preference for hybrid setups that may help evade detection or reduce dependence on a single provider.

Four column graphs showing the change in general and blocked domain abuse in 2021 and 2025
Figure 1 — UpSet plots showing how domain infrastructure is distributed across cloud services. A (web hosting), NS (DNS), and MX (email) are DNS record types. The figures show the percentage of domains using cloud infrastructure for each component, as well as the intersections where multiple components are cloud-hosted.

No Single Cloud Provider Dominates Abuse

Despite major providers like AWS, Google, and Azure hosting many general domains, most malicious infrastructure is spread across a broader range of cloud providers. This diversity makes abuse harder to detect and mitigate, since there is no single point of control.

Importantly, having a large market share does not automatically mean hosting a large share of malicious domains. This suggests that provider policies, security practices, and abuse response mechanisms matter, even if their impact is difficult to measure directly.

Three column charts showing the share of malicious activity across major cloud providers hosting Web, DNS and Email infrastructure.
Figure 2 — The share of providers for each infrastructure component. ‘Other’ refers to cloud providers other than the ones listed, and All refers to general domains.

Geography Still Matters

We also examined the likelihood that different countries host blocked domains compared with their hosting of general domains. Figure 3 illustrates where abuse is more prevalent than where many domains are hosted. Across web hosting, DNS, and email infrastructure, countries such as China and Russia show higher ratios of malicious activity, reflecting a higher relative concentration of abuse rather than absolute volume. Overall, the geographic patterns are consistent across infrastructure components, differing mainly in intensity.

Three world heat maps showing the level of abuse across web, DNS and email in each country
Figure 3 — Global distribution of domain infrastructure. Darker colors indicate a higher ratio of abuse in the infrastructure. The ratio is calculated by each country’s share of blocked domains to its share of general domains.

What This Means for Policy and Practice

Our findings point to several important takeaways:

  • Cloud abuse is evolving, and attackers are using hybrid cloud setups.
  • Security efforts should focus not only on fully cloud-hosted systems, but also on partial and mixed infrastructures.

Cloud computing remains essential for an open and scalable Internet. However, as this research illustrates, protecting the Internet requires understanding how shared infrastructure can be misused and adapting defensive mechanisms accordingly.

Read our paper “Double-Edged Sword: An Empirical Study on the Contribution of Cloud Providers in Malicious Infrastructure” to learn more about our methodology and complete analysis.

Sousan Tarahomi is a PhD candidate in the Design and Analysis of Communication Systems (DACS) group at the University of Twente.