With that entry, risk actors can “poke round” varied repositories and workflows and search for something that hints at cloud entry, configuration objects, scripts, and hidden secrets and techniques, he famous. In the event that they get entry to actual cloud credentials, they “have the keys to the corporate’s AWS bucket, Azure subscriptions, and different workflows.”
They’ll then spin up cloud assets, entry databases, steal supply code, set up malicious recordsdata akin to crypto miners, sneak in malicious workflows, and even pivot to different cloud companies, whereas organising persistence mechanisms to allow them to return each time they need.
“At that time, mainly something you are able to do within the cloud, so can they,” mentioned Avakian.



