October 1, 2024 By Austin Zeizel 4 min read

As we step into October and mark the start of Cybersecurity Awareness Month, organizations’ focus on protecting digital assets has never been more important. As innovative new cloud and generative AI solutions help advance today’s businesses, it’s also important to understand how these solutions have added to the complexity of today’s cyber threats, and how organizations can address them. That’s why IBM—as a leading global security, cloud, AI and business service provider—advocates to our global clients to take a proactive approach to embedding security into all aspects of their business.

To that end, the 2024 IBM X-Force Cloud Threat Landscape Report provides an in-depth look at the most impactful risks organizations face today, and why implementing proper security mitigation strategies for cloud environments is vital to an organization’s success. Drawing upon threat intelligence, incident response engagements, and partnerships with Cybersixgill and Red Hat Insights, the IBM X-Force team offers unique insights on how adversaries are compromising cloud infrastructure by leveraging adversary-in-the-middle (AITM) attacks, business email compromise (BEC) and other attack methods.

For example, this year’s report highlights how attackers know that credentials are the keys to cloud environments and are highly sought-after on dark web marketplaces. For this reason, attackers are using phishing, keylogging, watering hole and brute force attacks to harvest credentials. Furthermore, dark web research highlights the popularity of infostealers, which are used to steal cloud platform and service-specific credentials.

Some of the other key findings from this year’s report reveal sophisticated attack methods and ways of exploiting cloud environments that include:

  • Phishing is the leading initial access vector. Over the past two years, phishing has accounted for 33% of cloud-related incidents, with attackers often using phishing to harvest credentials through adversary-in-the-middle (AITM) attacks.
  • Business Email Compromise (BEC) attacks go after credentials. BEC attacks, where attackers spoof email accounts posing as someone within the victim organization or another trusted organization, accounted for 39% of incidents over the past two years. Threat actors commonly leverage harvested credentials from phishing attacks to take over email accounts and conduct further malicious activities.
  • Continued demand for cloud credentials on the dark web, despite market saturation. Gaining access via compromised cloud credentials was the second most common initial access vector at 28%, despite overall mentions of SaaS platforms on dark web marketplaces, which decreased by 20% compared to 2023.
Download the report

AITM phishing leads to business email compromise and credential harvesting

AITM phishing is a more sophisticated form of a phishing attack where attackers position themselves between the victim and a legitimate entity to intercept or manipulate communications. This type of attack is particularly dangerous because it can bypass some forms of MFA, making it a powerful tool for cybercriminals.

Once inside a victim’s environment, threat actors seek to carry out their objectives. Two of the most common actions observed by X-Force were BEC attacks (39%) and credential harvesting (11%). For example, after an attacker compromises a cloud-hosted email platform, they could perform several tasks such as intercepting sensitive communications, manipulating financial transactions, or using compromised email accounts to conduct further attacks.

Leveraging security threat intelligence to inform the business’ employee training programs can be key to helping mitigate all forms of phishing attacks, including AITM. Employees should be trained to accurately recognize and report phishing techniques, spoofed emails and suspicious links to their IT or security teams. Deploying advanced email filtering and protection tools that leverage AI to detect and block phishing attempts, malicious links and attachments before they can reach end users is also an effective mitigation strategy. Finally, passwordless authentication options, such as a QR code or FIDO2 authentication, can help protect against AITM phishing attacks.

Gaining access through cloud credentials more cost effective than ever

The average price per compromised cloud credentials on the dark web is USD 10.23 in 2024, a decrease of 12.8% since 2022. This price drop, in addition to the 20% decrease in overall mentions of SaaS platforms on dark web marketplaces, may indicate that the market for these credentials is becoming oversaturated. However, it also reflects an increasing availability of these credentials for threat actors to leverage before and during attacks. Thus, it’s no surprise that more than a quarter of cloud-related incidents involved the use of valid credentials, making it the second most common initial attack vector. As the price of for-sale cloud credentials decreases, it’s becoming more cost effective (and stealthier) for attackers to compromise organizations by logging in using valid credentials.

The desire for adversaries to obtain cloud credentials for malicious purposes and illicit financial profit is also evident from the continued trend of credential theft from infostealers specifically designed to exfiltrate credentials from cloud services. This threat highlights the need for organizations to manage their cyber exposure and digital risk. Businesses should seek a solution that specifically focuses on discovering, indexing and tracking operators, malware and data across clear web and deep and dark web sources. Early detection of compromised credentials allows swift response measures, such as password resets and changes to access controls, to prevent potential future breaches.

A robust framework for improving cloud security

Cloud security is especially relevant in today’s business environment, with enterprises increasingly migrating their critical business data from on-prem solutions to cloud environments. Alongside this technology migration is an evolving cyber threat landscape, where threat actors are actively seeking to compromise organizations’ heavy reliance on cloud infrastructure, particularly those handling sensitive business data. This growing dependence on cloud infrastructure has only widened the attack surface for threat actors to exploit and underscores why securing the cloud is more crucial than ever.

As long as victims’ cloud environments remain accessible through valid credentials, cybercriminals will continue to seek and use them for their campaigns and operations, whether through phishing, BEC or selling them on the dark web. As seen in IBM’s 2024 Cost of a Data Breach report, the financial implications and business disruptions for organizations continue to climb.

These examples illustrate the wide-ranging impact of stolen cloud credentials, from intellectual property theft to ransomware deployment. Attackers can use valid credentials to remain undetected and bypass standard security measures, making credential-based attacks a significant and ongoing threat to organizations.

By implementing a holistic approach to cloud security—including protecting data, having an identity and access management (IAM) strategy, proactively managing risks, and being ready to respond to a cloud incident—organizations can be better prepared to defend their cloud infrastructure and services and reduce the overall risk of credential-based attacks.

As IBM continues to release major security reports like its 2024 Cost of a Data Breach report and the 2024 Threat Intelligence Index, this cloud-focused report captures the specific risks businesses face as they continue along their cloud migration journey. For a deeper dive into the latest cloud-related threats and trends, download the 2024 IBM X-Force Cloud Threat Landscape Report.

Want to strengthen your cloud security? Consult with one of our X-Force experts to evaluate your organization’s cloud defensive strategies.

You can also register for the webinar, “Are you equipped to handle the evolving cloud threat landscape?” here on Thursday, October 17 at 11:00 EDT.

Register for the webinar

Was this article helpful?
YesNo

More from Security

Why data security is critical to AI

2 min read - Data is the new oil. It fuels our economy and drives new technology—notably, generative AI. However, for AI to be widely adopted, it must be trustworthy and secure. As IBM’s latest Cost of a Data Breach Report shows, business disruptions push breach costs and regulatory fines to new heights, with the average cost of a data breach reaching USD 4.88 million. However, according to a survey conducted by the IBM Institute for Business Value (IBV) study on cybersecurity and gen…

Tech industry ramps up efforts to combat rising deepfake threats

2 min read - Deepfake fraud is surging, signaling an alarming trend in corporate security. Scammers can now create convincing voice impersonations of executives, potentially manipulating stock prices and orchestrating multi-million dollar frauds. As companies rush to bolster defenses, experts say many remain unprepared for this rapidly evolving threat. "Bad actors have a low barrier to entry," warns Srinivas Tummalapenta, an IBM Distinguished Engineer & CTO of IBM Security Services. With just $5 and a minute-long voice sample, scammers can now impersonate CEOs, potentially…

Palo Alto Networks acquires IBM QRadar SaaS assets: Strengthening joint AI security solutions and next-generation security operations to prevent threats at scale

2 min read - Today, Palo Alto Networks announced the completion of its acquisition of IBM's QRadar Software as a Service (SaaS) assets, strengthening the companies’ strategic alliance and paving the way for more organizations to benefit from our joint next-generation security operations and AI-powered solutions. The security industry is at a turning point in which AI will transform businesses and drive business growth; however the ever-growing threat landscape continues to challenge teams to adapt. In the recent IBM Cost of a Data Breach Report,…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters