Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

OpenAI’s Promptfoo Deal Plugs Agentic AI Testing Gap

March 10, 2026

How to Protect Your SaaS from Bot Attacks with SafeLine WAF

March 10, 2026

Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials

March 10, 2026
Facebook X (Twitter) Instagram
Tuesday, March 10
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials
Cyber Security

Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials

Team-CWDBy Team-CWDMarch 10, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Google Cloud has warned that threat actors targeting cloud environments now favor campaigns which gain initial access by exploiting software vulnerabilities over credential-based attacks. 

Published on 9 March, the Google Cloud Office of the CISO’s H1 2026 Google Cloud Threat Horizons Report, details how the cloud threat landscape evolved based on how attackers attempted to target Google Cloud services during the second half of 2025.

“Our team has observed a fundamental shift in the landscape,” said Crystal Lister, security advisor and head of cloud threat horizons report program for Office of the CISO, at Google Cloud.

Traditionally, threat actors have relied on weak or missing credentials and misconfigurations to gain access to Google Cloud environments.

However, the second half of 2025 saw threat actors increasingly turn towards exploiting unpatched third-party vulnerabilities.

In total, third-party software-based entry accounted for 44.5% of primary entry vectors during the second half of 2025. This represents a significant increase from the 2.9% observed during the first half of the year.

In comparison, abuse of weak or absent credentials as an entry point dropped from 47.1% in the first half of the year, down to 27.2% in the second half.

React2Shell Top Targeted Vulnerability

One of the most commonly software vulnerabilities used to target cloud services was CVE-2025-55182, more commonly known as React2Shell, a critical remote code execution vulnerability in React Server Components.

The vulnerability can enable attackers to take control of servers and compromise data. It has been tied to cyber-attacks by nation-state threat actors linked to both North Korea and China.

“While Google Cloud’s underlying infrastructure remains secure, threat actors are successfully targeting unpatched applications and permissive user-defined firewall rules,” said Google Cloud.

The company also warned that attackers have also got quicker at the mass exploitation of software vulnerabilities following their public disclosure.

“To mitigate these risks across any environment, cloud defenders should focus on identity access controls, using centralized visibility tools to secure data, and automated posture enforcement,” said Google.

According to the report, the window between vulnerability disclosure and mass exploitation collapsed by “an order of magnitude” from weeks to just days. Ultimately, if organizations haven’t patched vulnerabilities within days of the disclosure, then their cloud services are vulnerable to attackers.

For example, Google Cloud noted that within just 48 hours of the public disclosure of React2Shell in December 2025, multiple threat actors had already exploited the vulnerability to infect victims with cryptocurrency mining malware.

Google has issued advice to organizations on what they should do to avoid falling victim to newly disclosed vulnerabilities.

“Defensively, organizations should pivot from manual patching to automated defenses—such as patching the Web Application Firewall (WAF)—to neutralize exploits at the network edge before software updates can be applied,” the company recommended.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRussian Hackers Target WhatsApp and Signal Accounts
Next Article How to Protect Your SaaS from Bot Attacks with SafeLine WAF
Team-CWD
  • Website

Related Posts

Cyber Security

AI Security Startups Dominate New Cyber Innovation Awards

March 9, 2026
Cyber Security

Zero-Click FreeScout Bug Enables Remote Code Execution

March 6, 2026
Cyber Security

Cisco Issues Patches for 48 Vulnerabilities

March 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Here’s what you should know

February 6, 2026

What parents should know to protect their children from doxxing

November 28, 2025

Look out for phony verification pages spreading malware

September 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.