Attackers Can Compromise Most Cloud Data in Just 3 Steps

  /     /     /  
Publicated : 23/11/2024   Category : security


Attackers Can Compromise Most Cloud Data in Just 3 Steps


An analysis of cloud services finds that known vulnerabilities typically open the door for attackers, while insecure cloud architectures allow them to gain access to the crown jewels.



Companies and their cloud providers often leave vulnerabilities open in their system and services, gifting attackers with an easy path to gain access to critical data.
According to an Orca Security analysis of data collected from major cloud services and released on Sept. 13, attackers only need, on average, three steps to gain access to sensitive data, the so-called crown jewels, starting most often — in 78% of cases — with the exploitation of a known vulnerability.
While much of the security discussion has focused on the misconfigurations of cloud resources by companies, cloud providers have often been slow to plug vulnerabilities, says Avi Shua, CEO and co-founder of Orca Security.
The key is to fix the root causes, which is the initial vector, and to increase the number of steps that they attacker needs to take, he says. Proper security controls can make sure that even if there is an initial attack vector, you are still not able to reach the crown jewels.
The
report analyzed data
from Orcas security research team using data from a billions of cloud assets on AWS, Azure, and Google Cloud, which the companys customers regularly scan. The data included cloud workload and configuration data, environment data, and information on assets collected in the first half of 2022.
The analysis identified a few main problems with cloud-native architectures. On average, 11% of cloud providers and their customers cloud assets were considered neglected, defined as not having been patched in the last 180 days. Containers and virtual machines, which make up the most common components of such infrastructure, accounted for more than 89% of neglected cloud assets.
There is room for improvement on both sides of the shared responsibility model, Shua says. Critics have always focused on the customer side of the house [for patching], but in the past few years, there have been quite a few issues on the cloud-provider end that have not been fixed in a timely manner.
In fact, fixing vulnerabilities may be the most critical problem, because the average container, image, and virtual machine had at least 50 known vulnerabilities. About three-quarters — 78% — of attacks start with the exploitation of a known vulnerability, Orca stated in the report. Moreover, a tenth of all companies have a cloud asset using software with a vulnerability at least 10 years old.
Yet the security debt caused by vulnerabilities is not evenly distributed across all assets, the report found. More than two-thirds — 68% — of Log4j vulnerabilities were found in virtual machines. However, only 5% of workload assets still have at least one of the Log4j vulnerabilities, and only 10.5% of those could be targeted from the Internet.
Another major problem is that a third of companies have a root account with a cloud provider that is not protected by multifactor authentication (MFA). Fifty-eight percent of companies have disabled MFA for at least one privileged user account, according to Orcas data. Failing to provide the additional security of MFA leaves systems and services open to brute-force attacks and password spraying.
In addition to the 33% of firms lacking MFA protections for root accounts, 12% of companies have an Internet-accessible workload with at least one weak or leaked password, Orca stated in its report.
Companies should look to enforce MFA across their organization (especially for privileged accounts), assess and fix vulnerabilities faster, and find ways to slow down attackers, Shua says.
The key is to fix the root causes, which is the initial vector, and to increase the number of steps that the attacker needs to take, he says. Proper security controls can make sure that even if the attacker has success with the initial attack vector, they are still not able to reach the crown jewels.
Overall, both cloud providers and their business clients have security issues that need to be identified and patched, and both need to find ways to more efficiently close those issues, he adds; visibility and consistent security controls across all aspects of cloud infrastructure is key.
It is not that their walls are not high enough, Shua says. It is that they are not covering the entire castle.

Last News

▸ Veritabile Defecte de Proiectare a Securitatii in Software -> Top 10 Software Security Design Flaws ◂
Discovered: 23/12/2024
Category: security

▸ Sony, XBox Targeted by DDoS Attacks, Hacktivist Threats ◂
Discovered: 23/12/2024
Category: security

▸ There are plenty of online tools for reporting bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Attackers Can Compromise Most Cloud Data in Just 3 Steps