LATEST INTELLIGENCE owners into delegating permissions for accessing system resources .
• Insider threats – credential loss created by negligence or malicious intent .
• Malware – malicious software installed in systems can go unnoticed for long periods of time . Such malware can steal credentials and communicate with the attacker .
Risk factors
• Using shadow IT or cloud applications and services without approval from the IT department .
• Poor email and cloud security monitoring tools .
• Credential sharing among employees or with outside partners .
• Low user awareness of good security practices and common phishing techniques .
As business assets have moved to the cloud , cyber attackers have followed close behind . Starting with hosted email and webmail , cloud productivity apps like Office 365 and Google Workspace , and on to cloud development environments like AWS and Azure , cyber criminals have prized account credentials and made them the target of countless phishing campaigns . And with single sign-on giving lateral access to many different systems within an organisation , a single compromised account can cause widespread damage .
Cloud account compromise in the news
Capital One fined $ 80 million for 2019 hack of 100 million credit card applications
The US Department of Justice arrested Paige Thompson , a former Amazon software engineer , and charged her with computer fraud and abuse for allegedly accessing Capital One data . Using a server-side request forgery ( SSRF ) attack , she obtained credentials for a role that had access to sensitive information stored in Amazon ’ s S3 file-storage service . According to prosecutors , Thompson discussed her exploits in detail on her Slack channel and posted instructions on GitHub for duplicating the attack . p
www . intelligentcio . com INTELLIGENTCIO LATAM 17