Tech »  Topic »  The most common way threat actors infiltrate cloud environments

The most common way threat actors infiltrate cloud environments


Image: Sundry Photography/Adobe Stock

Financially motivated threat actors are increasingly sabotaging cloud backups in addition to primary data, aiming to maximize leverage in extortion schemes, Google warned in its H2 2025 Cloud Threat Horizons Report, released today.

These threat actors may disable backup routines, delete stored data, or alter user permissions to block recovery attempts.

In the second half of 2025, credential compromise accounted for 47% of cloud security incidents, while misconfiguration followed at 29%, according to Google Cloud. Leaked credentials — present in 2.9% of initial access cases — also posed a growing concern.

The report noted that the sources of predominant threats were very similar to trends from earlier in the year. The most common access points were weak or absent credentials, misconfigurations, and API or UI compromises.

Weak or absent credentials were the primary method by which threat actors gained initial access to cloud environments. Image: Google ...
Copyright of this story solely belongs to techrepublic.com - cloud . To see the full text click HERE