7 Cloud Attack Techniques You Should Worry About

Security pros detail the common and concerning ways attackers target enterprise cloud environments.

Kelly Sheridan, Former Senior Editor, Dark Reading

March 6, 2020

8 Slides

As organizations transition to cloud environments, so too do the cybercriminals targeting them. Learning the latest attack techniques can help businesses better prepare for future threats.

"Any time you see technological change, I think you certainly see attackers flood to either attack that technological change or ride the wave of change," said Anthony Bettini, CTO of WhiteHat Security, in a panel at last week's RSA Conference. It can be overwhelming for security teams when organizations rush headfirst into the cloud without consulting them, putting data and processes at risk.

Attackers are always looking for new ways to leverage the cloud. Consider the recently discovered "Cloud Snooper" attack, which uses a rootkit to bring malicious traffic through a victim's Amazon Web Services environment and on-prem firewalls before dropping a remote access Trojan onto cloud-based servers. As these continue to pop up, many criminals rely on tried-and-true methods, like brute-forcing credentials or accessing data stored in a misconfigured S3 bucket. There's a lot to keep up with, security pros say.

"When you're taking your existing security skills and you're moving into an entirely different environment, then it's an incredible challenge to figure out what you really need to focus on, as well as what's going on out there in the real word," said Rich Mogull, analyst with Securosis and CISO of DisruptOps, in an RSA Conference talk about attack kill chains in the cloud.

Here we discuss some of these common kill chains, as well as other cloud attack techniques, that are top-of-mind for security pros and cybercriminals alike. Anything you're worried about that we didn't list here? Feel free to share your thoughts in the Comments section, below.

About the Author

Kelly Sheridan

Former Senior Editor, Dark Reading

Kelly Sheridan was formerly a Staff Editor at Dark Reading, where she focused on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial services. Sheridan earned her BA in English at Villanova University. You can follow her on Twitter @kellymsheridan.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights