Cloud exploitation is up 95%. What should you do about it?

A person at a laptop with a secure lock symbol floating above it.
(Image credit: Shutterstock / laymanzoom)

Over the past several years, organizations have taken tremendous steps to adopt cloud services and infrastructure, transforming the way business is done. And as our recent data shows, threat actors have done the same.

Observed cloud exploitation cases grew by 95% in 2022, according to CrowdStrike’s latest Global Threat Report. Cases involving cloud-conscious actors — adversaries who are aware of their ability to compromise cloud workloads and use this to exploit features unique to the cloud — nearly tripled from 2021.

The pattern is clear: eCrime and nation-state actors alike are adapting their knowledge and tradecraft to increasingly target cloud environments. This is clear in the top cloud-focused tactics, techniques, and procedures (TTPs), which our experts identified and tracked over the course of the past year.

Cloud-focused attacks are evolving. Throughout 2022, cloud-conscious actors primarily gained initial access to cloud environments by simply logging in with existing valid accounts, resetting passwords, or exploiting public facing applications such as web servers. We saw more attackers pursuing cloud account discovery, a shift from the comparatively heavier reliance on cloud infrastructure discovery observed in 2021.

This underscores a key finding from this year’s report: Threat actors are actively targeting the cloud and using legitimate credentials to do so. eCrime and targeted intrusion adversaries have shifted their focus to credential-based attacks when targeting the cloud. While cybercriminals’ tactics can vary, successful credential-based attacks are often done via fake login pages masquerading as Microsoft Office 365, Okta and other email accounts or SaaS providers. These credentials are the keys to the kingdom of a network and extremely valuable to the threat actor for their future plans to target an organization.

Let’s take a closer look at the TTPs attackers use once they’re inside a cloud environment.

Zeki Turedi

Zeki Turedi is EMEA CTO at CrowdStrike.

Using credentials to infiltrate the cloud

Cloud-based workloads are dynamic and often short-lived, forcing actors to be tenacious in their attempts to maintain access. Most intruders we observed established persistence by harnessing legitimate cloud accounts they already had, creating new accounts, or resetting the password of already targeted accounts. If the actor gained access through a web server, they placed webshells or reverse shells on the compromised machine for persistence.

During the initial discovery process, attackers mostly focused on cloud accounts to achieve both persistence and privilege escalation. In addition, they often searched for reachable network services, cloud permission groups, infrastructure, and storage buckets. To move laterally around the environment, attackers primarily used protocols like RDP, SSH and SMB. Those with console access used services like EC2 and instance connect, as well as internal cloud tools such as Systems Manager Session Manager.

Several industry reports have claimed resource hijacking was the most common impact technique used last year; however, we saw the most widespread impact technique was destructive. Attackers removed access to accounts, terminated services, destroyed data, and deleted resources. If they collected data, they took it from local systems and internal information repositories.

To protect cloud and hybrid environments, IT and security leaders need cloud-native technologies and a cloud-focused mindset — both of which must be rooted in maintaining flexibility, scalability and consistency across their IT infrastructure. An approach that combines agent-based and agentless cloud security delivers the most comprehensive protection.

Creating a stronger enterprise cloud defense

Why both? Today’s IT and security teams must enforce continuous monitoring and security from the development process to runtime. An agent-only approach typically falls short due to the rate of change in modern cloud environments. Not only are cloud resources routinely spun up and taken down, but teams have to account for short-lived containers and serverless functions as they come in and out of existence.

Complicating matters is the fact that IT and security teams typically don’t have access or control over all the hosts in an environment; therefore, they can’t deploy agents on them. This lack of coverage creates security blind spots where attackers can strike.

An agentless approach is equally ineffective on its own because it only offers partial visibility and lacks remediation capabilities. Further, agentless security relies on snapshots of cloud environments taken at set intervals. Given the average breakout time for eCrime intrusion activity declined from 98 minutes in 2021 to 84 minutes in 2022, adversaries could presumably slip into a cloud environment unnoticed and move laterally to remove access to accounts, terminate services, destroy data and delete resources. This is why both agentless scanning and agent-driven protection are needed to fully protect cloud environments from today’s adversaries.

As organizations continue to expand their cloud infrastructure, and cloud-focused attacks continue to become more prevalent, it is imperative security teams adopt a strong cloud security posture. This requires an adversary-focused approach that takes common TTPs into account, prevents identity-based threats, addresses misconfigurations and protects endpoints and cloud workloads.

We've featured the best online cybersecurity courses.

Zeki Turedi is EMEA CTO at CrowdStrike.

Read more
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Abstract image of cyber security in action.
Four key questions to strengthen your cyber threat detection strategy
Security padlock in circuit board, digital encryption concept
A guide to integrating application security into any cyber defense strategy
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
Latest in Software & Services
TinEye website
I like this reverse image search service the most
A person in a wheelchair working at a computer.
Here’s a free way to find long lost relatives and friends
A white woman with long brown hair in a ponytail looks down at her computer in a distressed manner. She is holding her forehead with one hand and a credit card with the other
This people search finder covers all the bases, but it's not perfect
That's Them home page
Is That's Them worth it? My honest review
woman listening to computer
AWS vs Azure: choosing the right platform to maximize your company's investment
A person at a desktop computer working on spreadsheet tables.
Trello vs Jira: which project management solution is best for you?
Latest in Opinion
An image of network security icons for a network encircling a digital blue earth.
Why multi-CDNs are going to shake up 2025
Pixel Studio on an phone
Pixel Studio on the Pixel 9 now lets you generate AI images of people, and the results can be terrifying
A person using a smartphone with a cybersecurity lock symbol appearing over it.
The growing threat of device code phishing and how to defend against It
Cybersecurity
Why OT security needs exposure management to break the cycle of endless patching
Employees sat around together discussing business issues.
AI deregulation: what smart leaders do when the rules go off the rails
Apple Watch Series 9 with Snoopy
Please, Apple, don't add a camera to the Apple Watch – it's not the change we're hoping for