Cloud Attacks Retrospective: Evolving Tactics, Familiar Entry Points

Let's break down eight attack patterns security teams should be watching in 2025.

1 분 읽기

Cloud environments are growing more complex—but attackers aren’t necessarily getting more advanced. Instead, they’re applying creativity to familiar weaknesses: misconfigurations, unpatched systems, and credential misuse. 

That’s the key theme in Wiz’s newly released Cloud Attack Retrospective: 8 Common Threats to Watch for in 2025, a data-driven analysis of real-world cloud attacks based on detections across thousands of environments. The report maps eight of the most frequently observed MITRE ATT&CK techniques to specific threat campaigns, CVEs, and persistent trends across the cloud ecosystem. 

Here’s a preview of what stood out: 

 

Following the disclosure of CVE-2024-0012 and CVE-2024-9474 in PAN-OS, Wiz observed attackers deploying web shells and Sliver implants just days after PoCs went public. 

  • 24% of monitored environments contained vulnerable PAN-OS appliances 

  • 7% were internet-facing and exploitable via unauthenticated RCE 

These cases show how quickly attackers pivot from disclosure to exploitation—especially when edge infrastructure is exposed. 

The CPU_HU campaign targeted weak PostgreSQL configurations, exploiting default or guessable credentials to deploy cryptominers

  • 90% of cloud environments analyzed use self-managed PostgreSQL 

  • Nearly one-third had at least one instance exposed publicly 

This underscores how foundational hardening steps—like restricting access and enforcing credential policies—remain critical. 

Phishing remains the top cause of identity-based cloud breaches. 

  • 0ktapus used spoofed SSO portals to harvest credentials 

  • Atlas Lion employed adversary-in-the-middle proxies and smishing to bypass MFA 

Even with modern defenses, user-targeted phishing continues to yield high success rates in cloud environments. 

Persistence is no longer an afterthought—it’s embedded from the start.

  • In Redis and Jenkins environments, attackers used cron jobs to relaunch cryptominers on reboot 

  • Selenium Grid instances without authentication were abused to execute payloads via browser automation 

Simple, resilient techniques continue to evade detection—especially when deployed on services with limited monitoring. 

What’s inside the full report? 

The Cloud Attack Retrospective: 8 Common Threats to Watch for in 2025 includes: 

  • Detailed analysis of the top MITRE ATT&CK techniques abused by actors in the cloud 

  • Real-world incidents tied to specific CVEs, misconfigurations, and IAM abuse 

  • Campaigns involving Diicot, Bapak, 0ktapus, and more 

  • Practical guidance on how to detect and disrupt attack chains in your environment

계속 읽기

맞춤형 데모 받기

맞춤형 데모 신청하기

"내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다."
데이비드 에슬릭최고정보책임자(CISO)
"Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다."
아담 플레처최고 보안 책임자(CSO)
"우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다."
그렉 포니아토프스키위협 및 취약성 관리 책임자