Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Software vulnerabilities push credential abuse aside in cloud intrusions
    Cybersecurity

    Software vulnerabilities push credential abuse aside in cloud intrusions

    adminBy adminMarch 11, 2026No Comments6 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Software vulnerabilities push credential abuse aside in cloud intrusions
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cloud intrusions are unfolding on shorter timelines, with attackers leaning more on unpatched software and compromised identities.

    cloud environments cyber threats

    H2 2025 distribution of initial access vectors exploited in Google Cloud (Source: Google)

    Google Cloud’s Cloud Threat Horizons Report H1 2026 reflects incident response and intelligence findings from the second half of 2025 and shows how access methods and objectives are changing in cloud and SaaS environments.

    Third-party software flaws move ahead of credential abuse

    Unpatched third-party applications became the primary initial access path in observed Google Cloud incidents. Software vulnerabilities overtook weak or absent credentials, marking a shift from earlier intrusion patterns that leaned more on password reuse and configuration mistakes.

    Attackers targeted externally exposed applications and known vulnerabilities that could be exploited with limited interaction. Remote code execution formed a significant portion of this software-driven access, reflecting automated exploitation of application-layer flaws and internet-facing services.

    The window between vulnerability disclosure and mass exploitation collapsed from weeks to days, with threat actors deploying XMRig cryptocurrency miners within approximately 48 hours of public disclosure.

    Credential abuse remained common, and misconfiguration continued to provide openings into exposed systems. The leading position of software exploitation places greater weight on application security, patch cycles, and hardening of public services.

    “The scariest part of this report is seeing so many more exploits through third-party software, and we have to consider AI-based attacks as a major contributor to this. Rogue organizations are using tools to find and exploit weaknesses in the critical, often open-source software on which all modern stacks are built, and AI is now a huge part of that. It’s not all bad, though, as there’s been a decrease in organizations leaving the keys under the plant pot and an uptick in better credential hygiene,” Matt Saunders, VP DevOps, Adaptavist, told Help Net Security.

    Identity perimeters targeted with vishing and token theft

    Identity compromise continued to underpin most intrusions involving cloud and SaaS environments. Threat actors leaned on social engineering and stolen authentication material to move through trusted access channels.

    Voice-based phishing played a central role. Attackers impersonated internal staff and support personnel to pressure help desks and users into resetting credentials and altering MFA settings. These interactions enabled access that appeared legitimate inside identity systems.

    Token theft also featured prominently. Compromised OAuth tokens and other authentication artifacts linked to third-party applications enabled access without traditional login events. That pathway supported large-scale data access using valid sessions tied to trusted integrations.

    Email phishing remained active, often paired with credential harvesting and MFA fatigue tactics. Stolen identities also included non-human credentials such as service account keys and developer tokens exposed in earlier incidents or unsecured repositories.

    Malicious insiders shift data theft toward cloud storage

    Insider activity continued to center on data exfiltration. Reviews of malicious insider cases showed data theft as the dominant form of misconduct, affecting most incidents studied.

    Cloud services played a growing role in how insiders removed information. Corporate cloud environments and personally controlled cloud storage became common destinations for sensitive data.

    Exfiltration often took place during employment, with additional incidents occurring after individuals left their organizations. Some insiders accessed and removed data during both periods.

    Multiple exfiltration methods appeared frequently. Many incidents involved insiders using more than one pathway, such as combining email with cloud storage or removable media.

    Personally controlled cloud storage services featured in a notable share of cases. Some insiders relied on multiple cloud platforms to move data outside organizational controls.

    Email remained a leading pathway in the historical sample, and its use declined over time. Platform-agnostic cloud services represented the fastest growing method and are projected to become the primary channel for insider data theft.

    North Korean actors weaponize Kubernetes for cryptocurrency theft

    State-sponsored activity linked to North Korean actors included a campaign that moved from endpoint compromise into cloud infrastructure and Kubernetes workloads. The operation relied on social engineering, abuse of trusted workflows, and living-off-the-cloud techniques to reach financial systems.

    Attackers gained a foothold on a developer workstation through a trojanized application and leveraged authenticated sessions and available credentials to pivot into cloud resources. Reconnaissance activity focused on compute instances, bastion hosts, and containerized workloads.

    Persistence mechanisms were established by modifying Kubernetes deployment configurations so newly created pods executed attacker-controlled commands. Additional changes targeted CI/CD-related resources to expose service account tokens in logs.

    Stolen high-privilege service account tokens enabled privilege escalation and lateral movement into sensitive systems. Access extended to workloads responsible for user identity and financial operations.

    Attackers extracted database credentials stored insecurely in environment variables and used them to access production databases. Account controls were modified, enabling unauthorized access to high-value user accounts and financial systems. The campaign ended with multimillion-dollar cryptocurrency theft.

    AI-driven supply chain techniques come into focus

    An intrusion investigated by Mandiant researchers shows how supply chain compromise and identity trust relationships can escalate from developer tooling into production cloud control. The attack began with a compromised Node Package Manager package that executed malicious code and harvested environment data and authentication tokens from a developer workstation.

    A stolen GitHub personal access token enabled unauthorized access to the organization’s source code repositories. The threat actor then abused a GitHub-to-cloud OpenID Connect trust relationship to obtain temporary cloud credentials.

    An overly permissive cloud role allowed the deployment of new infrastructure and the creation of administrative privileges. Privilege escalation enabled access to production resources, data exfiltration, and destructive activity in the cloud environment.

    The malware also used a LLM tool on the compromised endpoint to identify files of interest, demonstrating how AI tools can assist credential discovery and environment reconnaissance during intrusions.

    Saunders said supply chain activity is increasing in frequency and impact. “The report shows that supply chain attacks are also more frequent, with threat actors injecting malicious code into trusted places and having those attacks propagate through pipelines to ultimately steal or destroy data, ironically leveraging the victim’s own automation systems for profit. Fuzzing is so much easier thanks to Generative AI’s ability to learn the context of a potential vulnerability vector, so it’s no surprise that these attacks have multiplied.”

    He added that defensive posture needs to adjust. “To fight against this, organizations need to keep up with these techniques, and also limit the blast radius of any potential attack. Zero-trust security approaches are more important than ever, making sure that systems that could be used as a transport for an attack are running with the fewest privileges they need. A robust incident management process to address potential threats and real attacks is also critical.

    “The pressure to deliver software faster and safer never stops though, and everyone needs to step up on automating governance to catch changes, including weaknesses, potential attack routes, and actual hackers trying to get in. Just bolting this over the top isn’t enough any more; it needs to be standard practice for everyone,” concluded Saunders.

    Abuse Cloud credential Intrusions push software Vulnerabilities
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThink Twice Before Buying or Using Meta’s Ray-Bans
    Next Article You Can Get ClearVPN, an Easy, Beginner-Friendly VPN Setup, on Sale for Just $20 Right Now
    admin
    • Website

    Related Posts

    Google completes $32B acquisition of Wiz

    March 11, 2026

    SQLi flaw in Elementor Ally plugin impacts 250k+ WordPress sites

    March 11, 2026

    MedTech Giant Stryker Crippled by Iran-Linked Hacker Attack

    March 11, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google completes $32B acquisition of Wiz

    March 11, 2026

    50+ Free & Creative April Marketing Ideas (With Examples!)

    March 11, 2026

    Samsung already nuked the only cool thing about the Galaxy S26’s AI

    March 11, 2026

    F5 brings new visibility and AI controls to Big-IP, NGINX

    March 11, 2026
    Categories
    • Blogging (37)
    • Cybersecurity (721)
    • Privacy & Online Earning (108)
    • SEO & Digital Marketing (454)
    • Tech Tools & Mobile / Apps (888)
    • WiFi / Internet & Networking (119)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google completes $32B acquisition of Wiz

    March 11, 2026

    50+ Free & Creative April Marketing Ideas (With Examples!)

    March 11, 2026

    Samsung already nuked the only cool thing about the Galaxy S26’s AI

    March 11, 2026
    Most Popular
    • Google completes $32B acquisition of Wiz
    • 50+ Free & Creative April Marketing Ideas (With Examples!)
    • Samsung already nuked the only cool thing about the Galaxy S26’s AI
    • F5 brings new visibility and AI controls to Big-IP, NGINX
    • SQLi flaw in Elementor Ally plugin impacts 250k+ WordPress sites
    • Eight out of ten PMax advertisers are now running CTV ads
    • MedTech Giant Stryker Crippled by Iran-Linked Hacker Attack
    • 10 Best VPNs for Android Phones & tablets
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.