OBJECTIVE 02 — CLOUD COMPUTING THREATS AND ATTACKS
WHY CLOUD IS A TARGET (EXAM LOGIC)
| Reason |
|---|
| Shared infrastructure |
| Internet exposure |
| Misconfiguration |
| Weak access control |
| API dependency |
MEMORY HOOK:
Shared + exposed + misconfigured
CLOUD THREAT ACTORS (EXAM)
| Threat Actor |
|---|
| External attackers |
| Malicious insiders |
| Compromised accounts |
| Rogue administrators |
CLOUD-SPECIFIC THREATS (MUST MEMORIZE)
DATA BREACH
| Aspect | Explanation |
|---|---|
| What | Unauthorized access to sensitive data |
| Cause | Weak IAM, misconfiguration |
| Impact | Data loss, compliance violation |
EXAM TRAP:
Cloud provider does NOT prevent data breaches automatically.
MEMORY HOOK:
Misconfig = data leak
DATA LOSS
| Aspect | Explanation |
|---|---|
| What | Permanent loss of data |
| Cause | Accidental deletion, ransomware |
| Impact | Business disruption |
ACCOUNT OR SERVICE HIJACKING (VERY IMPORTANT)
| Aspect | Explanation |
|---|---|
| What | Attacker gains control of cloud account |
| Method | Phishing, credential theft |
| Impact | Full resource control |
MEMORY HOOK:
Account = keys to kingdom
INSECURE INTERFACES AND APIs
| Aspect | Explanation |
|---|---|
| What | Poorly protected cloud APIs |
| Risk | Unauthorized access |
| Example | No authentication, weak tokens |
EXAM TRAP:
APIs are the PRIMARY cloud attack surface.
MEMORY HOOK:
Cloud = API-driven
MISCONFIGURATION (TOP EXAM ITEM)
| Example |
|---|
| Public S3 buckets |
| Open storage |
| Default credentials |
| Over-permissive IAM |
MEMORY HOOK:
Most cloud breaches = misconfig
MALICIOUS INSIDERS
| Aspect | Explanation |
|---|---|
| Who | Employees, contractors |
| Risk | Abuse of privileges |
| Impact | Data theft, sabotage |
SHARED TECHNOLOGY VULNERABILITIES
| Aspect | Explanation |
|---|---|
| What | Weakness in shared components |
| Example | Hypervisor escape |
| Impact | Cross-tenant attacks |
MEMORY HOOK:
Shared hardware = shared risk
DENIAL OF SERVICE (DoS/DDoS)
| Aspect | Explanation |
|---|---|
| What | Resource exhaustion |
| Target | Availability |
| Impact | Service outage |
EXAM TRAP:
Auto-scaling does NOT stop DDoS completely.
ABUSE AND NEFARIOUS USE OF CLOUD SERVICES
| Example |
|---|
| Crypto mining |
| Malware hosting |
| Botnet C2 |
MEMORY HOOK:
Cloud = attacker infrastructure
CLOUD ATTACK TYPES (DETAILED)
CLOUD MALWARE INJECTION ATTACK
| Step |
|---|
| Attacker injects malicious service |
| Instance treated as legitimate |
| Malware executed |
MEMORY HOOK:
Fake instance attack
METADATA SERVICE ATTACK
| Aspect | Explanation |
|---|---|
| Target | Cloud metadata API |
| Data | Credentials, tokens |
| Example | SSRF to metadata |
MEMORY HOOK:
Metadata = secret store
VM ESCAPE ATTACK
| Aspect | Explanation |
|---|---|
| What | Break out of VM |
| Target | Hypervisor |
| Impact | Host compromise |
EXAM TRAP:
Rare but critical.
SIDE-CHANNEL ATTACKS
| Aspect | Explanation |
|---|---|
| What | Information leakage |
| Method | Cache timing |
| Target | Co-resident VMs |
CLOUD IDENTITY & ACCESS ATTACKS
IAM MISUSE
| Issue |
|---|
| Overprivileged roles |
| No MFA |
| Long-lived credentials |
MEMORY HOOK:
IAM mistakes = breach
TOKEN THEFT
| Method |
|---|
| XSS |
| Malware |
| SSRF |
CLOUD ATTACK FLOW (EXAM LOGIC)
-
Recon cloud assets
-
Identify misconfiguration
-
Exploit IAM or API
-
Escalate privileges
-
Persist access
MEMORY HOOK:
Recon → Misconfig → IAM → Control
COMMON CLOUD ATTACK TOOLS (EXAM)
| Tool | Purpose |
|---|---|
| ScoutSuite | Cloud security auditing |
| Prowler | AWS security assessment |
| Pacu | AWS exploitation |
| CloudSploit | Misconfiguration scanning |
| Metasploit | Cloud exploitation |
EXAM TRAPS (VERY IMPORTANT)
| Trap | Correct Understanding |
|---|---|
| Cloud is secure by default | False |
| Provider handles all security | False |
| Encryption prevents breaches | False |
| No need for monitoring | False |
OBJECTIVE 02 — EXAM MEMORY BLOCK
Cloud threats primarily arise from misconfiguration, weak IAM, and insecure APIs.
Account hijacking leads to full compromise.
Most attacks exploit configuration errors rather than vulnerabilities.
Shared infrastructure introduces unique risks.
STATUS
| Objective | Status |
|---|---|
| Cloud threats | COMPLETE |
| Attack types | COMPLETE |
| Tools | COMPLETE |
| Exam readiness | HIGH |