Emerging threat
The detection of an infrastructure attack is a complex process. An overall analysis of the environment shows that there is increased attacks that target various forms of cloud infrastructure. These kinds of attacks come in the form of malware, ransomware, crypto mining, along with other malicious threats that may attack the operating system. However, there are various kinds of information or rather indicators that may help in determining or rather highlighting that a threat is underway.
One of these indicators is that the exposed cloud infrastructure may contain infections along with malicious commands in the early stages. Apart from that, the other indicator is that the malicious attacks the targets as well as infects the exposed services install the crypto mining in the second stage, and even erases data (Whitman, & Mattord, 2009). The other indicator that may help in detecting that a threat is underway is the deletion of the database when it was to be encrypted in the first place.
Reference
Whitman, M. E., & Mattord, H. J. (2009). Principles of information security. Boston, Mass
: Thomson Course Technology.