Google: Cloud attacks exploit flaws more than weak credentials

Google: Cloud attacks exploit flaws more than weak credentials

Hackers are rapidly weaponizing newly disclosed third‑party software flaws to gain initial access to cloud environments, shrinking the exploitation window from weeks to just days. State-sponsored and financially motivated actors are increasingly using bug exploits, supply‑chain compromises, and compromised identities to silently exfiltrate data and maintain long-term access #React2Shell #UNC4899

Keypoints

  • Bug exploits were the primary initial access vector in 44.5% of incidents, while credential-based breaches accounted for 27%.
  • Remote code execution flaws like React2Shell (CVE-2025-55182) and the XWiki bug (CVE-2025-24893) were widely exploited, including in RondoDox botnet activity.
  • The exploitation window collapsed to days, with cryptominers deployed within 48 hours of vulnerability disclosure and some payloads appearing within an hour of new instance creation.
  • State-linked actors such as UNC1549 and UNC5221 achieved multi‑year persistence, and UNC4899 used social engineering and a malicious binary to steal millions in cryptocurrency.
  • Supply‑chain and OpenID Connect abuses (QuietVault/s1ngularity) and rising insider use of cloud services for exfiltration highlight the urgent need for automated detection and response.

Read More: https://www.bleepingcomputer.com/news/security/google-cloud-attacks-exploit-flaws-more-than-weak-credentials/