Don't fall victim to these 6 cloud attacks

Posted by Taylor Cheetham on Dec 4, 2020 4:45:50 PM
Taylor Cheetham
Find me on:

Don't fall victim to these 6 cloud attacks

Hybrid cloud environments experience the highest number of cyberattacks.

Having your data distributed across multiple cloud platforms heightens the risk of a cyber breach if the right security solution isn’t implemented correctly.


Here are 6 cloud attacks to be aware of:

Cross cloud attack

During a cross-cloud attack, the hacker can gain access to on-premise data centres and private cloud systems by breaching the public cloud.

Once the hacker has infiltrated the public cloud workloads, it allows for the attack to transition into the private cloud.


Cross-data-centre attack

If a hacker is successful in breaching a data centre, they will be able to spread and carry out a cross-data-centre attack.

Transitioning between data centres is made possible by the Points of Delivery (PoD), which are trusted zones. If one PoD is compromised, then the attacker will be able to move across and breach the connected data centres.


Cross-tenant attack

In a cross-tenant attack, cybercriminals can exploit the network traffic inside multi-tenant environments.

There is an assumption that cloud service providers automatically secure your data. In most cases, it is the responsibility of the organisation to enforce a defence system to add an extra layer of security.

To lower the risk of cross-tenant attacks, it is recommended to implement a multi-layered security system with suitable controls. The controls also need to be scaled correctly at the right place and time.


Cross-workload attack

The size and strength of cloud-based and virtualized workloads are of great appeal to hackers.

If one workload is compromised by an attacker, they will be able to access your database, virtual desktop and virtual web server.

Workloads running on the same tenant are especially hard to defend. That is why workloads need to be efficiently monitored in combination with basic segmentation.


Orchestration attacks

Cloud orchestration is used to manage many key tasks, including the interactions and connections on private and public cloud infrastructure.

Orchestration attacks are used to steal account logins or private cryptography keys. With those, the attacker can perform specific tasks that allow them to gain control and access.


Serverless attacks

Serverless applications eliminate the need to develop or expand infrastructure. Being serverless also allows organisations to increase the agility of cloud-based functions rapidly. These benefits come with a cost. Serverless creates vulnerabilities for hackers to exploit and new challenges for security experts to defend.

If privileges are set up incorrectly, an attacker has the potential to create new accounts and access your data.

Monitoring account behaviours in combination with network traffic inspection are the most effective way to detect and prevent a serverless attack.


How to secure the cloud

There are three core areas to consider when developing a cloud security strategy:

  • Security Tools
    Endpoint protection technologies are poorly equipped to deal with cloud attacks. Infrastructure attacks target servers and application frameworks while endpoint threats attack web browsers and software.
    It is critical that the security solution you implement for your environment is built into the cloud and capable of protecting your cloud workloads and web applications.
  • Architecture
    The architecture used in traditional data centres is not the same as in the cloud. It is crucial to design your architecture with the security and management of your cloud environment in mind.
  • Connection points
    Hybrid cloud environments are more susceptible to cyber threats. The biggest weakness is if they are connected to data centres that are still running legacy code. By identifying these points in your cloud deployment, you will be better able to secure this connection.
    It is important to be aware of the types of attacks that threaten cloud environments and the strategies you can put in place to prevent your data from being compromised.

If you are interested in learning more about how you can implement a cloud security strategy, contact one of our security experts today to receive a free consultation.


If you liked this article, you may also like:

What is cyber threat intelligence, and why do I need it?

How to save your organisation from long-term damage

Red Teaming and the origins of anonymous hacking


Taylor Cheetham

Marketing Coordinator


If your network future-proofed?


Do you believe what you see?

What used to be an internet oddity has developed i...

The end of trust?

Trust no-one! The ‘Zero Trust’ approach sets up a ...