Top 5 cloud security breaches (and lessons) 2021 and 2022 (2024)

EXECUTIVE SUMMARY:

Organizations leverage cloud computing to reduce compute costs and to rapidly provision new computing resources for the purpose of supporting evolving business needs. Cloud-based technologies provide opportunities to go-to-market quickly, allowing enterprises to reach stakeholders and customers faster than ever before.

Across the past 10 years, cloud computing has transformed from into a cornerstone of the IT industry, boosting power of virtualization, storage, hosting and other networking services. Nonetheless, the cloud environment is vulnerable to cyber attacks. In 2021, forty percent of organizations reported cloud security breaches.

Below are five cloud security breach examples and lessons that all organizations can benefit from.

1. Accenture. In August of 2021, Accenture fell prey to a LockBit ransomware attack. The culprits claimed to have stolen 6TB worth of data, for which they requested a ransom of $50 million.

The largest exposed server appeared to contain credentials linked to Accenture customer accounts. One backup database contained nearly 40,000 passwords – the majority of which were in plain text.

“This cloud leak shows that even the most advanced and secure enterprises can expose crucial data and risk serious consequences,” wrote security researcher Chris Vickery.

Lesson learned: Ensure that IT departments and/or cyber security personnel check to ensure correct configuration of AWS cloud servers. Attacks on misconfigured servers can cause extreme reputational, client and financial damage.

2. Kaseya. In July of 2021, IT solutions provider Kaseya identified an attack on their unified remote monitoring and network perimeter security tool. The attackers aimed to steal administrative control for Kaseya services; from managed service providers to downstream customers.

The attack itself disrupted the organization’s SaaS servers and affected on premise VSA solutions used by Kaseya customers across nearly a dozen countries. After Kaseya alerted customers about the attack, it then rolled out the Kaseya VSA detection tool, which enabled business users to analyze VSA services and to screen endpoints for indicators of vulnerability.

Lessons learned: From this attack, organizations observed the importance of maintaining updated backups in easily retrievable, air-gapped repositories that remain segregated from organizational networks. Businesses are also reminded to manage patches, implement multi-factor authentication, and follow principles of zero trust.

3. Cognyte. In May of 2021, the cyber analytics firm Cognyte left a database unsecured without authentication protocols. In turn, hackers managed to expose 5 billion records. Information such as names, email addresses, passwords, and vulnerability data points within their system were leaked. Information was even indexed by search engines.

Lessons learned: The company managed to secure the data within four days, but the incident highlighted how persistent cyber attackers can effectively exploit the smallest of flaws. In this instance, the importance of cyber attack prevention cannot be overstated. Prevent as many attacks as possible through a combination of policies, tools, education and vigilance.

4. Facebook. In April of 2021, Facebook reported a breach affecting hundreds of millions of user records, which were publicly exposed on Amazon’s cloud computing service. Although Facebook confirmed that it identified and resolved the issue immediately, the attack managed to impact founder Mark Zuckerberg.

In precipitating the incident, two third-party Facebook app development companies posted the records in plain sight. The database exposed contained private information that social engineers could use in targeted attacks or within hacking attempts.

Lessons learned: In resolving this issue, Facebook reached out to Amazon, which took down the exposed servers. “…If you’re still opening AWS buckets [to the public], you’re not paying attention,” says business advisor Corey Quinn.

5. Raychat. In February of 2021, Raychat, an online chat application, survived a large-scale cyber attack. A cloud database configuration breach gave hackers free access to 267 million usernames, emails, passwords, metadata and encrypted chats. Shortly thereafter, a targeted bot attack erased the entirety of the company’s data.

According to reports, a MongoDB misconfiguration left the data openly available. The attack highlighted how NoSQL databases can function as easy targets for bot threat actors.

Organizations need to ensure that databases are secure. NoSQL databases in particular represent targets for malicious actors who wish to steal or wipe content, unless given a ransom payment. In Raychat’s case, a README ransom note appeared, demanding roughly $700 USD.

Lesson learned: Database security requires a range of tools controls and measures that can protect the database itself, the actual data embedded within, its database management system and the assorted applications that access it. End-to-end compliance technologies and cybersecurity penetration tests can help.

In closing

Cloud computing increases operational efficiency and simplicity, provided that security measures are in place. Is your cloud secure enough?

Be sure to avoid AWS security breaches and other common stumbling points. For more cloud security breach insights, see CyberTalk.org’s past coverage. Also, be sure to check out our Cloud Security Buyer’s Guide.

Top 5 cloud security breaches (and lessons) 2021 and 2022 (2024)

FAQs

Top 5 cloud security breaches (and lessons) 2021 and 2022? ›

1) Misconfiguration

Misconfigurations in cloud security settings are a prevalent cause of data breaches, often resulting from inadequate security posture management practices.

Which of these are one of the top 5 cloud risks? ›

Top 7 Risks of Cloud Computing
  • Lack of Visibility. ...
  • Cloud Misconfigurations. ...
  • Data Loss. ...
  • Accidental Data Exposure. ...
  • Identity Theft. ...
  • Insecure Integration and APIs. ...
  • Data Sovereignty.

What are the top three cloud computing attacks to be aware of? ›

10 Types of Cloud Computing Attacks
  • Denial-of-Service Attacks. ...
  • Account Hijacking. ...
  • Security Misconfiguration. ...
  • User Account Compromise. ...
  • Cloud Malware Injection Attacks. ...
  • Insider Threats. ...
  • Side-Channel Attacks. ...
  • Cookie Poisoning.

What are the three main security threats on the cloud? ›

4 Cloud Security Risks
  • Unmanaged Attack Surface.
  • Human Error.
  • Misconfiguration.
  • Data Breach.
Apr 1, 2024

What are the top 5 emerging cyber security challenges? ›

Top 10 Cybersecurity Threats:
  • Social Engineering.
  • Third-Party Exposure.
  • Configuration Mistakes.
  • Poor Cyber Hygiene.
  • Cloud Vulnerabilities.
  • Mobile Device Vulnerabilities.
  • Internet of Things.
  • Ransomware.
Jul 24, 2024

What is the number one issue for security in the cloud? ›

1) Misconfiguration

Misconfigurations in cloud security settings are a prevalent cause of data breaches, often resulting from inadequate security posture management practices.

Which cloud is the safest? ›

These are the six most secure cloud storage solutions:
  • IDrive: Best overall secure cloud storage solution.
  • pCloud: Best for extended storage functionalities.
  • OneDrive: Best for Microsoft systems integration.
  • Internxt: Best option for secure file sharing features.
  • Sync.com: Best for ease of use and administration.
Mar 21, 2024

What are the most critical threats for cloud computing? ›

Main Cloud Security Issues and Threats in 2024
  • Misconfiguration. Misconfigurations of cloud security settings are a leading cause of cloud data breaches. ...
  • Unauthorized Access. ...
  • Insecure Interfaces/APIs. ...
  • Hijacking of Accounts. ...
  • Lack of Visibility. ...
  • External Sharing of Data. ...
  • Malicious Insiders. ...
  • Cyberattacks.

What is the most effective security in cloud computing? ›

Encryption is one of the best ways to secure your cloud computing systems. There are several different ways of using encryption, and they may be offered by a cloud provider or by a separate cloud security solutions provider: Communications encryption with the cloud in their entirety.

Which type of cloud is prone to hacker's attacks more often? ›

API vulnerabilities

Cloud services rely heavily on APIs to communicate with applications. It might seem like a neat little tool, but these APIs are the most prone to cyberattacks. Hackers can launch DoS attacks and inject codes to break into the cloud server and access the organization's personal data.

What are the two key issues for cloud data security? ›

What are the challenges of cloud data security?
  • Lack of visibility. ...
  • Less control. ...
  • Confusion over shared responsibility. ...
  • Inconsistent coverage. ...
  • Growing cybersecurity threats. ...
  • Strict compliance requirements. ...
  • Distributed data storage.

Which of the following are part of the top 5 cloud security threats? ›

Top 10 Cloud Security Risks.
  • Data Breaches. The immense amount of data stored by Cloud Service Providers (CSPs) in public and private clouds has become a gold mine for hackers. ...
  • Account hijacking. ...
  • API Insecurity. ...
  • Malware. ...
  • Data Loss. ...
  • Denial-of-Service Attacks. ...
  • Insider Threats. ...
  • Advanced Persistent Threats.

What is the biggest challenge with securing the cloud? ›

Top Cloud Security Challenges and How to Overcome Them
  1. Managing a Rapidly Evolving Attack Surface. ...
  2. Lack of Visibility. ...
  3. Containerized Environments in the Cloud. ...
  4. Shadow IT. ...
  5. Lack of Cloud Security Strategy and Skills. ...
  6. Cloud Compliance. ...
  7. Data Sovereignty.

What are cloud security breaches? ›

A cloud security breach is when a malicious party gains access to data stored in the cloud. The more cloud-based services you use, and the more remote devices used to access your network, the more entry points there are through which a hacker could gain access.

What is the biggest challenges of cloud computing? ›

Top 14 Challenges of Cloud Computing
  • Security.
  • Password Security.
  • Cost Management.
  • Lack of expertise.
  • Internet Connectivity.
  • Control or Governance.
  • Compliance.
  • Multiple Cloud Management.

What are the 5 components of data security in cloud computing? ›

It consists of elements like secure data storage, secure network infrastructure, access control, encryption, and application security measures.

What are the seven cloud computing security risks? ›

What Are the Seven Security Issues Relating to Cloud Computing and SaaS?
  • Access Management. ...
  • Cloud Misconfigurations. ...
  • Regulatory Compliance. ...
  • Storage and Retention. ...
  • Risk Management. ...
  • Security Monitoring. ...
  • Privacy and Data Breaches.

Which of the following are considered as cloud security challenges? ›

Cloud threats are specific security issues that could exploit vulnerabilities within cloud environments. These threats, including malware attacks, phishing, and insider threats, can have consequences like unauthorized access, data theft, or system compromise.

Top Articles
We are sorry, the page you requested cannot be found
New crypto tax reporting obligations took effect on new year’s day
Pet For Sale Craigslist
13 Easy Ways to Get Level 99 in Every Skill on RuneScape (F2P)
Professor Qwertyson
Linkvertise Bypass 2023
Phenix Food Locker Weekly Ad
What's New on Hulu in October 2023
House Share: What we learned living with strangers
Pwc Transparency Report
Newgate Honda
Robert Malone é o inventor da vacina mRNA e está certo sobre vacinação de crianças #boato
Blog:Vyond-styled rants -- List of nicknames (blog edition) (TouhouWonder version)
How Much Is Tj Maxx Starting Pay
Samsung Galaxy S24 Ultra Negru dual-sim, 256 GB, 12 GB RAM - Telefon mobil la pret avantajos - Abonament - In rate | Digi Romania S.A.
Lima Funeral Home Bristol Ri Obituaries
Peraton Sso
Mail.zsthost Change Password
Straight Talk Phones With 7 Inch Screen
Idaho Harvest Statistics
NHS England » Winter and H2 priorities
Adam4Adam Discount Codes
50 Shades Of Grey Movie 123Movies
Lakers Game Summary
Https Paperlesspay Talx Com Boydgaming
Craigslist Apartments Baltimore
R&S Auto Lockridge Iowa
Parkeren Emmen | Reserveren vanaf €9,25 per dag | Q-Park
Kabob-House-Spokane Photos
Dr. Nicole Arcy Dvm Married To Husband
Busted Mugshots Paducah Ky
EVO Entertainment | Cinema. Bowling. Games.
R Baldurs Gate 3
Astro Seek Asteroid Chart
Winterset Rants And Raves
Guide to Cost-Benefit Analysis of Investment Projects Economic appraisal tool for Cohesion Policy 2014-2020
Craigslist/Phx
Nurtsug
Promatch Parts
Swimgs Yuzzle Wuzzle Yups Wits Sadie Plant Tune 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Autumns Cow Dog Pig Tim Cook’s Birthday Buff Work It Out Wombats Pineview Playtime Chronicles Day Of The Dead The Alpha Baa Baa Twinkle
P3P Orthrus With Dodge Slash
Help with your flower delivery - Don's Florist & Gift Inc.
Studio 22 Nashville Review
Yakini Q Sj Photos
Sechrest Davis Funeral Home High Point Nc
10 Types of Funeral Services, Ceremonies, and Events » US Urns Online
Cara Corcione Obituary
Is Chanel West Coast Pregnant Due Date
Gear Bicycle Sales Butler Pa
Craigslist Indpls Free
Bumgarner Funeral Home Troy Nc Obituaries
E. 81 St. Deli Menu
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 6188

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.