Identification and Analysis of Emerging Propagation Techniques Utilized by Malware Targeting Cloud Environments