• About
  • Subscribe
  • Contact
Monday, March 16, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home CISO

Third-party exploits now primary access vector in Google Cloud attacks

by FutureCISO Editors
March 16, 2026
Third-party exploits now primary access vector in Google Cloud attacks

Photo by Pixabay: https://www.pexels.com/photo/three-men-playing-soccer-274422/

Share on FacebookShare on Twitter

The latest Cloud Threat Horizons Report, highlighting significant changes in the tactics employed by threat actors targeting cloud environments during the second half of 2025. Key findings reveal that third-party software vulnerabilities have, for the first time, surpassed weak credentials as the primary driver of Google Cloud intrusions.

The report indicates a pivotal shift in threat actor tactics. In H2 2025, unpatched third-party vulnerabilities were exploited in 44.5% of incidents, sharply rising from just 2.9% in H1 2025.

Concurrently, breaches facilitated by weak or absent credentials dropped from 47.1% to 27.2%. The window between the disclosure of vulnerabilities and their exploitation has significantly decreased from weeks to mere days, emphasizing the need for improved security measures.

Identity compromise was a factor in 83% of observed incidents, underscoring the growing sophistication of social engineering tactics. Voice-based phishing, or vishing, was noted in 17% of cases, indicating a trend away from traditional phishing strategies.

Additionally, malicious insiders are increasingly leveraging cloud storage for data theft, with both corporate and personal cloud services being used for exfiltration in 35% of data theft cases. This trend necessitates vigilance and proactive measures to manage insider threats effectively.

The report also documented a sophisticated campaign by North Korean group UNC4899, which utilised Kubernetes workloads to facilitate multi-million dollar cryptocurrency theft. By tricking a developer into downloading compromised software, the group manipulated the target’s Google Cloud environment and escalated their privileges through compromised accounts.

Furthermore, AI-driven supply chain attack techniques have gained traction, with threat actors using large language models (LLMs) to automate credential harvesting. This enables rapid transitions from developer environments to full cloud administrative access.

Related:  Half of dark web exploits target zero-day vulnerabilities

One notable attack involved the exploitation of a compromised Node Package Manager (NPM) package, which allowed attackers to create new administrator roles within a victim’s cloud environment.

As organisations navigate these emerging threats, the report serves as a vital resource for CISOs aiming to strengthen their security postures against increasingly sophisticated cloud attacks.

Tags: cloud security automationGoogle Cloud Securityidentity-based attacksthird-party vulnerabilities

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Third-party exploits now primary access vector in Google Cloud attacks
  • Pioneering cybersecurity leadership in a challenging landscape
  • Commentary: Which side of the double-edged AI sword are organisations on?
  • TrendAI drives global takedown of Tycoon 2FA phishing operation
  • Trellix SecondSight to enhance cyber resilience against advanced threats

Categories

  • AI and Machine Learning
  • Artificial Intelligence
  • Blogs
  • CHRO
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • HR, education and Training
  • Incident Response
  • Network Security
  • Operations
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webcasts/Podcasts
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl