BusinessCybersecurityNewswireTechnology

Software Vulnerabilities Now Top Cloud Attack Vector

▼ Summary

– Unpatched third-party software vulnerabilities have become the primary initial access method for cloud intrusions, overtaking credential abuse.
– Identity compromise remains central to cloud attacks, with threat actors increasingly using voice phishing and token theft to bypass security.
– Malicious insiders are shifting data exfiltration methods toward using personal and corporate cloud storage services.
– North Korean state actors conducted a campaign using social engineering and Kubernetes manipulation to steal millions in cryptocurrency.
– AI is being used by attackers to enhance supply chain attacks and reconnaissance, while defenders must adopt zero-trust principles to limit damage.

The landscape of cloud security is undergoing a significant transformation, with software vulnerabilities now surpassing compromised credentials as the leading attack vector. This shift, detailed in recent threat intelligence, underscores a faster-moving threat environment where attackers rapidly weaponize known flaws in third-party applications. The time between a vulnerability’s public disclosure and its widespread exploitation has dramatically shrunk, compressing what was once a matter of weeks into a mere handful of days. This new reality places immense pressure on application security and patch management cycles, demanding a proactive and accelerated response from defenders.

For the first time, unpatched flaws in third-party software have become the primary method for initial access into cloud environments, moving ahead of traditional credential-based attacks. Threat actors are aggressively targeting externally exposed applications, with a particular focus on remote code execution vulnerabilities that allow for automated exploitation. In one stark example, attackers deployed cryptocurrency mining software within approximately 48 hours of a vulnerability being made public. While credential abuse and cloud misconfigurations remain prevalent entry points, the ascendance of software exploitation highlights the critical need for robust application security and the hardening of all internet-facing services.

Identity-based attacks continue to form the backbone of many intrusions, with adversaries employing sophisticated social engineering to bypass modern defenses. Voice phishing, or vishing, has emerged as a central tactic, where attackers impersonate internal IT staff to manipulate help desks into resetting credentials or modifying multi-factor authentication settings. This method grants attackers access that appears legitimate within an organization’s identity systems. Additionally, the theft of OAuth tokens and other authentication artifacts allows threat actors to move laterally using valid, trusted sessions, often avoiding traditional login alerts entirely. Email phishing campaigns persist, frequently combined with tactics designed to induce “MFA fatigue” in targeted users.

Malicious insiders are increasingly leveraging cloud platforms to exfiltrate sensitive data. Investigations reveal that data theft is the dominant form of insider misconduct, with corporate and personal cloud storage services becoming the preferred destinations for stolen information. Exfiltration often occurs during an individual’s employment, though incidents post-departure are also common. While email has historically been a leading pathway, its use is declining in favor of platform-agnostic cloud services, which are projected to become the primary channel for insider data theft. Many cases involve insiders using multiple methods in combination, such as cloud storage paired with removable media.

A state-sponsored campaign attributed to North Korean actors demonstrated a sophisticated pivot from endpoint compromise to cloud infrastructure exploitation, specifically targeting Kubernetes environments. After gaining initial access through a trojanized application on a developer workstation, the attackers used authenticated sessions to move into cloud resources. They established persistence by maliciously modifying Kubernetes deployment configurations, ensuring newly created pods executed their commands. By stealing high-privilege service account tokens and extracting database credentials from insecure environment variables, the actors ultimately escalated privileges to access financial systems, resulting in a multimillion-dollar cryptocurrency theft.

Supply chain attacks are growing in both frequency and impact, with recent intrusions illustrating how compromised developer tools can lead to full cloud control. In one documented case, a malicious package in the Node Package Manager ecosystem executed code that harvested authentication tokens from a developer’s machine. A stolen GitHub token then provided access to source code repositories, which the attacker leveraged to abuse an OpenID Connect trust relationship between GitHub and the cloud environment. This granted them temporary cloud credentials and, through an overly permissive role, administrative privileges. The malware involved even used a large language model tool on the compromised endpoint to help identify valuable files for exfiltration.

Defending against these evolving threats requires a fundamental adjustment in security posture. Organizations must prioritize limiting the potential blast radius of any breach by rigorously applying zero-trust principles, ensuring all systems operate with the minimum necessary privileges. Automating governance and compliance checks within development pipelines is no longer optional but a standard practice needed to catch configuration weaknesses and malicious changes in real-time. Building a robust incident response capability is equally critical, as the speed of modern attacks leaves little room for delay. The pressure to deliver software rapidly and securely continues to intensify, demanding that security be seamlessly integrated into every stage of the development and operational lifecycle.

(Source: HelpNet Security)

Topics

third-party vulnerabilities 95% identity compromise 90% credential abuse 85% supply chain compromise 85% social engineering 80% ai-driven attacks 80% data exfiltration 75% patch management 75% token theft 75% malicious insiders 70%