Most concerning is the targeted attack on Identity and Access Management (IAM) tokens, which security researchers describe as “holding the keys to the cloud kingdom.”
The comprehensive analysis by Unit 42 highlights a 388% overall increase in cloud security alerts throughout 2024, with high-severity alerts climbing by an alarming 235%.
These figures represent a significant escalation in both the volume and sophistication of attacks against cloud environments. “Identity is the defense perimeter of cloud infrastructure,” states the Unit 42 report.
“Attackers target IAM tokens and credentials as they hold the keys to the cloud kingdom, allowing attackers to move laterally, escalate their permissions and perform additional malicious operations.”
Stop attacks before they start, powered by a 97% precise neural Network to Detect Cyber Attacks
Among the most troubling trends identified was the surge in remote command-line access events utilizing IAM tokens and credentials, which increased threefold in 2024.
By December, the average cloud environment experienced over 200 alerts for remote command-line usage of serverless function IAM tokens, compared to just two such alerts in January.
The research documented several other concerning patterns:
Security researchers noted these attacks align with findings from their 2024 State of Cloud-Native Security Report, which found 71% of organizations attributing increased vulnerability exposures to accelerated deployments, while 45% reported a rise in advanced persistent threat (APT) attacks.
A particularly alarming example involves a ransomware campaign that harvested over 90,000 credentials from 110,000 targeted domains, including nearly 1,200 cloud IAM credentials.
These stolen credentials enabled successful extortion attacks against multiple organizations.
The concentration of attacks on serverless functions has drawn particular concern. According to the research, serverless functions are designed to operate autonomously, and remote usage of a serverless function’s IAM token indicates compromise and potential lateral movement within cloud environments.
Experts recommend implementing Cloud Detection and Response (CDR) tools alongside traditional Cloud Security Posture Management (CSPM) solutions.
While CSPM tools focus on configuration vulnerabilities, CDR provides runtime monitoring to detect malicious activities as they occur.
Key recommendations include:
“Given the increasing threats targeting cloud environments, the only real defense is to require cloud-based agents for publicly exposed and critical cloud endpoints,” the report concludes, emphasizing that runtime monitoring and response capabilities are essential to prevent malicious operations within cloud infrastructures.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
The post Cloud Attacks Raises by Five Times Attacking Sensitive IAM Service Accounts appeared first on Cyber Security News.
Illustration by Heather Landis An ALPR snaps photos of passing cars. Its purpose is to…
Photo by Joan Marcus/Disney Many Broadway actors leave once a contract is up. You’ve been…
With prices of electric bikes reaching an all-time low, it's time to retire that pedal-powered…
Star Wars actor Oscar Isaac has admitted that his much-memed "Somehow, Palpatine returned" line was…
Introduction The need for artificial intelligence security has never been greater as it continues to…
Financial crime was once an unfortunate, yet unavoidable, consequence of an increasingly sophisticated economy. But…
This website uses cookies.