Hackers Abuse Vulnerable Training Web Apps to Breach Enterprise Cloud Environments - CySecurity News - Latest Information Security and Hacking Incidents

Hackers Abuse Vulnerable Training Web Apps to Breach Enterprise Cloud Environments - CySecurity News - Latest Information Security and Hacking Incidents - Featured Image

Hackers Abuse Vulnerable Training Web Apps to Breach Enterprise Cloud Environments - CySecurity News - Latest Information Security and Hacking Incidents

www.cysecurity.news - faviconcysecurity.news
TLDR

Hackers are exploiting poorly secured web applications designed for security training to breach enterprise cloud environments, according to a report by Pentera. These vulnerable applications, including DVWA and OWASP Juice Shop, are being used as entry points to deploy cryptocurrency miners and webshells, and to gain administrative-level control over cloud environments. Pentera identified 1,926 active vulnerable applications, many of which were tied to excessive IAM permissions and hosted across AWS, GCP, and Azure. The researchers disclosed their findings to impacted companies, which have since remediated the issues. To reduce risk, Pentera advises organizations to keep an accurate inventory of all cloud assets, enforce least-privilege IAM permissions, remove default credentials, and set expiration policies for temporary cloud resources.

1Score: 1

0 Comments