Similarly to what I have done in 2022, 2021, and 2020,  I am listing those cyber attacks, whose information is available via OSINT, which exploited the cloud in one or more stages of the attack chain.

The campaigns are classified in four categories: Delivery and Exploitation (the cloud service is exploited to deliver a malware strain or a phishing page), Actions on Objective (the cloud service is exploited to steal data, or launch other attacks), Command and Control (the cloud service is exploited as a command and control infrastructure), and Data Exfiltration (the cloud service is used as a drop zone for the exfiltrated data).

Below you will find some statistics and a table with detailed information on the attacks.

Cloud-Native Threats 2023 - Top Exploited Cloud Services

No Data Found

Cloud-Native Threats 2023 - Top Exploitation Purposes

No Data Found

Cloud-Native Threats 2023 - Motivations

No Data Found

Cloud-Native Threats 2023 - Top Exploited Services: Delivery

No Data Found

Cloud-Native Threats 2023 - Top Exploited Services: Command and Control

No Data Found

Cloud-Native Threats 2023 - Top Exploited Services: Actions on Objective

No Data Found

Cloud-Native Threats 2023 - Top Exploited Services: Data Exfiltration

No Data Found

Cloud-Native Threats 2023 - Top Exploited Services: Cyber Crime

No Data Found

Cloud-Native Threats 2023 - Top Exploited Services: Cyber Espionage

No Data Found

Enjoy the interactive timeline, and thanks for sharing it, and supporting my work in spreading the risk awareness across the community. Also, don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, or Mastodon for the latest updates.

SUPPORT MY WORK!

Cloud-Native Threats in 2021

I am starting a new project to track cloud-native threats, similarly to what I have done in 2020, with an interactive timeline. As soon as I collect more data I will start to generate some statistics.

Continue Reading
POPULAR POSTS
  • 2022 Cyber Attacks Statistics

    And finally I have aggregated all the data collected in 2022 from the cyber attacks timelines. In the past year I have collected 3074 events...

  • Leaky Buckets in 2022

    Similarly to what I have done in 2021, I am now collecting the incidents due to cloud misconfigurations and leading to the exposure of data.

  • The Biggest Data Breaches of 2021

    With this new project I am going to track the biggest data breaches of 2021 extracted from my cyber attack timelines.

  • 2020 Cyber Attacks Statistics

    As promised, I have pulled together some statistics from the data collected in 2020. The master table is available at the end of the post after the charts.

  • Cloud-Native Threats in 2021

    I am starting a new project to track cloud-native threats, similarly to what I have done in 2020, with an interactive timeline. As soon as I collect more data I will start to generate some statistics.

FOLLOW ME ON TWITTER
CLOUD NATIVE THREATS IN 2022 INFOGRAPHIC
Cloud Native Threats in 2022 Infographic

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.