Using commercial infrastructure is also a way for cyber attackers to avoid detection and seem legit. Criminals can use legitimate payment methods to pay for cloud services, when they’re putting them to use in ways that are not obviously illegal. Once criminals get access to a cloud account, they can use it to host malicious or deceptive websites, host malware downloads, temporarily store stolen data, or run phishing campaigns. Some legitimate companies that buy services from the major cloud providers then resell them at a markup to anonymous buyers.”]
Source: https://www.csoonline.com/article/3432768/6-ways-cybercriminals-use-commercial-infrastructure.html

