Schwachstellen dominieren Cloud-Angriffe

4 hours ago 1
Cyber security Cloud computing blue abstract digital binary code background. Innovative technology and Artificial intelligence concept. New futuristic system technology symbol. Vector illustration. (Image credit: Shutterstock / MiniStocker)

  • Google report shows attackers shifting to software flaws over weak credentials
  • Vulnerabilities now account for 44.5% of cloud breaches, exploited within days
  • Third-party SaaS integrations increasingly abused for data theft and access

To break into cloud environments, cybercriminals are relying less on weak credentials and more on third-party software vulnerabilities, new research from Google has found.

The Cloud Threat Horizons Report claims early in 2025 most compromises still relied on weak, or missing credentials. However, in the second half of the year, attackers increasingly started exploiting vulnerabilities in externally managed software.

The shift was quite significant, too. Software vulnerabilities now account for 44.5% of initial access vectors, taking up a bigger share than weak credentials (27.2%) for the first time ever. Misconfigurations now take up 21%, and exposed interfaces 4.9%.

Article continues below

Changing tactics

The report also states that the hackers are exploiting these flaws much faster than ever before. Apparently, the window between vulnerability disclosure and exploitation shrunk from weeks to mere days, and in some cases, attackers were able to deploy cryptominers within 48 hours of the vulnerability becoming public.

Crooks are also abusing third-party integrations and SaaS relationships, Google said. Of all cloud intrusions tracked throughout 2025, a fifth (21%) involved compromised trusted third-party relationships.

“Akin to a SaaS supply chain compromise, UNC6395 leveraged compromised OAuth tokens associated with the Salesloft Drift application to conduct extensive discovery and bulk exfiltration of sensitive data from Salesforce tenants,” Google said.

“We also saw several intrusions involving theft and abuse of Salesforce Gainsight tokens to gain unauthorized access to victim environments.”

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

This is an important pivot. Misconfigured databases are generally seen as the biggest cause of data leaks, and if cloud storage providers improved identity protections and secure default configurations, and businesses learned a thing or two about securing their cloud infrastructure, it means the industry is moving in the right direction.

It also means attackers are increasingly targeting the weaker links around the cloud platform itself, such as third-party applications, developer tools, CI/CD pipelines, and SaaS integrations.

Best antivirus software header

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read Entire Article