Top 5 cloud security breaches (and lessons) 2021 and 2022 (2024)

EXECUTIVE SUMMARY:

Organizations leverage cloud computing to reduce compute costs and to rapidly provision new computing resources for the purpose of supporting evolving business needs. Cloud-based technologies provide opportunities to go-to-market quickly, allowing enterprises to reach stakeholders and customers faster than ever before.

Across the past 10 years, cloud computing has transformed from into a cornerstone of the IT industry, boosting power of virtualization, storage, hosting and other networking services. Nonetheless, the cloud environment is vulnerable to cyber attacks. In 2021, forty percent of organizations reported cloud security breaches.

Below are five cloud security breach examples and lessons that all organizations can benefit from.

1. Accenture. In August of 2021, Accenture fell prey to a LockBit ransomware attack. The culprits claimed to have stolen 6TB worth of data, for which they requested a ransom of $50 million.

The largest exposed server appeared to contain credentials linked to Accenture customer accounts. One backup database contained nearly 40,000 passwords – the majority of which were in plain text.

“This cloud leak shows that even the most advanced and secure enterprises can expose crucial data and risk serious consequences,” wrote security researcher Chris Vickery.

Lesson learned: Ensure that IT departments and/or cyber security personnel check to ensure correct configuration of AWS cloud servers. Attacks on misconfigured servers can cause extreme reputational, client and financial damage.

2. Kaseya. In July of 2021, IT solutions provider Kaseya identified an attack on their unified remote monitoring and network perimeter security tool. The attackers aimed to steal administrative control for Kaseya services; from managed service providers to downstream customers.

The attack itself disrupted the organization’s SaaS servers and affected on premise VSA solutions used by Kaseya customers across nearly a dozen countries. After Kaseya alerted customers about the attack, it then rolled out the Kaseya VSA detection tool, which enabled business users to analyze VSA services and to screen endpoints for indicators of vulnerability.

Lessons learned: From this attack, organizations observed the importance of maintaining updated backups in easily retrievable, air-gapped repositories that remain segregated from organizational networks. Businesses are also reminded to manage patches, implement multi-factor authentication, and follow principles of zero trust.

3. Cognyte. In May of 2021, the cyber analytics firm Cognyte left a database unsecured without authentication protocols. In turn, hackers managed to expose 5 billion records. Information such as names, email addresses, passwords, and vulnerability data points within their system were leaked. Information was even indexed by search engines.

Lessons learned: The company managed to secure the data within four days, but the incident highlighted how persistent cyber attackers can effectively exploit the smallest of flaws. In this instance, the importance of cyber attack prevention cannot be overstated. Prevent as many attacks as possible through a combination of policies, tools, education and vigilance.

4. Facebook. In April of 2021, Facebook reported a breach affecting hundreds of millions of user records, which were publicly exposed on Amazon’s cloud computing service. Although Facebook confirmed that it identified and resolved the issue immediately, the attack managed to impact founder Mark Zuckerberg.

In precipitating the incident, two third-party Facebook app development companies posted the records in plain sight. The database exposed contained private information that social engineers could use in targeted attacks or within hacking attempts.

Lessons learned: In resolving this issue, Facebook reached out to Amazon, which took down the exposed servers. “…If you’re still opening AWS buckets [to the public], you’re not paying attention,” says business advisor Corey Quinn.

5. Raychat. In February of 2021, Raychat, an online chat application, survived a large-scale cyber attack. A cloud database configuration breach gave hackers free access to 267 million usernames, emails, passwords, metadata and encrypted chats. Shortly thereafter, a targeted bot attack erased the entirety of the company’s data.

According to reports, a MongoDB misconfiguration left the data openly available. The attack highlighted how NoSQL databases can function as easy targets for bot threat actors.

Organizations need to ensure that databases are secure. NoSQL databases in particular represent targets for malicious actors who wish to steal or wipe content, unless given a ransom payment. In Raychat’s case, a README ransom note appeared, demanding roughly $700 USD.

Lesson learned: Database security requires a range of tools controls and measures that can protect the database itself, the actual data embedded within, its database management system and the assorted applications that access it. End-to-end compliance technologies and cybersecurity penetration tests can help.

In closing

Cloud computing increases operational efficiency and simplicity, provided that security measures are in place. Is your cloud secure enough?

Be sure to avoid AWS security breaches and other common stumbling points. For more cloud security breach insights, see CyberTalk.org’s past coverage. Also, be sure to check out our Cloud Security Buyer’s Guide.

Top 5 cloud security breaches (and lessons) 2021 and 2022 (2024)

FAQs

Top 5 cloud security breaches (and lessons) 2021 and 2022? ›

1) Misconfiguration

Misconfigurations in cloud security settings are a prevalent cause of data breaches, often resulting from inadequate security posture management practices.

Which of these are one of the top 5 cloud risks? ›

Top 7 Risks of Cloud Computing
  • Lack of Visibility. ...
  • Cloud Misconfigurations. ...
  • Data Loss. ...
  • Accidental Data Exposure. ...
  • Identity Theft. ...
  • Insecure Integration and APIs. ...
  • Data Sovereignty.

What are the top three cloud computing attacks to be aware of? ›

10 Types of Cloud Computing Attacks
  • Denial-of-Service Attacks. ...
  • Account Hijacking. ...
  • Security Misconfiguration. ...
  • User Account Compromise. ...
  • Cloud Malware Injection Attacks. ...
  • Insider Threats. ...
  • Side-Channel Attacks. ...
  • Cookie Poisoning.

What are the three main security threats on the cloud? ›

4 Cloud Security Risks
  • Unmanaged Attack Surface.
  • Human Error.
  • Misconfiguration.
  • Data Breach.
Apr 1, 2024

What are the top 5 emerging cyber security challenges? ›

Top 10 Cybersecurity Threats:
  • Social Engineering.
  • Third-Party Exposure.
  • Configuration Mistakes.
  • Poor Cyber Hygiene.
  • Cloud Vulnerabilities.
  • Mobile Device Vulnerabilities.
  • Internet of Things.
  • Ransomware.
Jul 24, 2024

What is the number one issue for security in the cloud? ›

1) Misconfiguration

Misconfigurations in cloud security settings are a prevalent cause of data breaches, often resulting from inadequate security posture management practices.

Which cloud is the safest? ›

These are the six most secure cloud storage solutions:
  • IDrive: Best overall secure cloud storage solution.
  • pCloud: Best for extended storage functionalities.
  • OneDrive: Best for Microsoft systems integration.
  • Internxt: Best option for secure file sharing features.
  • Sync.com: Best for ease of use and administration.
Mar 21, 2024

What are the most critical threats for cloud computing? ›

Main Cloud Security Issues and Threats in 2024
  • Misconfiguration. Misconfigurations of cloud security settings are a leading cause of cloud data breaches. ...
  • Unauthorized Access. ...
  • Insecure Interfaces/APIs. ...
  • Hijacking of Accounts. ...
  • Lack of Visibility. ...
  • External Sharing of Data. ...
  • Malicious Insiders. ...
  • Cyberattacks.

What is the most effective security in cloud computing? ›

Encryption is one of the best ways to secure your cloud computing systems. There are several different ways of using encryption, and they may be offered by a cloud provider or by a separate cloud security solutions provider: Communications encryption with the cloud in their entirety.

Which type of cloud is prone to hacker's attacks more often? ›

API vulnerabilities

Cloud services rely heavily on APIs to communicate with applications. It might seem like a neat little tool, but these APIs are the most prone to cyberattacks. Hackers can launch DoS attacks and inject codes to break into the cloud server and access the organization's personal data.

What are the two key issues for cloud data security? ›

What are the challenges of cloud data security?
  • Lack of visibility. ...
  • Less control. ...
  • Confusion over shared responsibility. ...
  • Inconsistent coverage. ...
  • Growing cybersecurity threats. ...
  • Strict compliance requirements. ...
  • Distributed data storage.

Which of the following are part of the top 5 cloud security threats? ›

Top 10 Cloud Security Risks.
  • Data Breaches. The immense amount of data stored by Cloud Service Providers (CSPs) in public and private clouds has become a gold mine for hackers. ...
  • Account hijacking. ...
  • API Insecurity. ...
  • Malware. ...
  • Data Loss. ...
  • Denial-of-Service Attacks. ...
  • Insider Threats. ...
  • Advanced Persistent Threats.

What is the biggest challenge with securing the cloud? ›

Top Cloud Security Challenges and How to Overcome Them
  1. Managing a Rapidly Evolving Attack Surface. ...
  2. Lack of Visibility. ...
  3. Containerized Environments in the Cloud. ...
  4. Shadow IT. ...
  5. Lack of Cloud Security Strategy and Skills. ...
  6. Cloud Compliance. ...
  7. Data Sovereignty.

What are cloud security breaches? ›

A cloud security breach is when a malicious party gains access to data stored in the cloud. The more cloud-based services you use, and the more remote devices used to access your network, the more entry points there are through which a hacker could gain access.

What is the biggest challenges of cloud computing? ›

Top 14 Challenges of Cloud Computing
  • Security.
  • Password Security.
  • Cost Management.
  • Lack of expertise.
  • Internet Connectivity.
  • Control or Governance.
  • Compliance.
  • Multiple Cloud Management.

What are the 5 components of data security in cloud computing? ›

It consists of elements like secure data storage, secure network infrastructure, access control, encryption, and application security measures.

What are the seven cloud computing security risks? ›

What Are the Seven Security Issues Relating to Cloud Computing and SaaS?
  • Access Management. ...
  • Cloud Misconfigurations. ...
  • Regulatory Compliance. ...
  • Storage and Retention. ...
  • Risk Management. ...
  • Security Monitoring. ...
  • Privacy and Data Breaches.

Which of the following are considered as cloud security challenges? ›

Cloud threats are specific security issues that could exploit vulnerabilities within cloud environments. These threats, including malware attacks, phishing, and insider threats, can have consequences like unauthorized access, data theft, or system compromise.

Top Articles
BRICS+ and the future of the US dollar | ISS Africa
Service charges: Who, what, where, when, why?
Devin Mansen Obituary
Canya 7 Drawer Dresser
Occupational therapist
Linkvertise Bypass 2023
Www.craigslist Augusta Ga
Directions To 401 East Chestnut Street Louisville Kentucky
Trade Chart Dave Richard
2022 Apple Trade P36
Weather Annapolis 10 Day
Hmr Properties
Cooktopcove Com
Worcester On Craigslist
Love In The Air Ep 9 Eng Sub Dailymotion
SXSW Film & TV Alumni Releases – July & August 2024
"Une héroïne" : les funérailles de Rebecca Cheptegei, athlète olympique immolée par son compagnon | TF1 INFO
Directions To Advance Auto
Satisfactory: How to Make Efficient Factories (Tips, Tricks, & Strategies)
Optum Urgent Care - Nutley Photos
Cookie Clicker Advanced Method Unblocked
Shoe Station Store Locator
Discord Nuker Bot Invite
Synergy Grand Rapids Public Schools
Inter Miami Vs Fc Dallas Total Sportek
Sensual Massage Grand Rapids
Cal State Fullerton Titan Online
Expression Home XP-452 | Grand public | Imprimantes jet d'encre | Imprimantes | Produits | Epson France
Best Town Hall 11
3 Ways to Format a Computer - wikiHow
Possum Exam Fallout 76
The Posturepedic Difference | Sealy New Zealand
2430 Research Parkway
Mbi Auto Discount Code
Stolen Touches Neva Altaj Read Online Free
De beste uitvaartdiensten die goede rituele diensten aanbieden voor de laatste rituelen
Texas Baseball Officially Releases 2023 Schedule
Joe's Truck Accessories Summerville South Carolina
Uhaul Park Merced
Craigslist Car For Sale By Owner
Heavenly Delusion Gif
Planet Fitness Santa Clarita Photos
Tillman Funeral Home Tallahassee
The Banshees Of Inisherin Showtimes Near Reading Cinemas Town Square
301 Priest Dr, KILLEEN, TX 76541 - HAR.com
Dr Mayy Deadrick Paradise Valley
Comanche Or Crow Crossword Clue
Autozone Battery Hold Down
56X40X25Cm
Julies Freebies Instant Win
Provincial Freeman (Toronto and Chatham, ON: Mary Ann Shadd Cary (October 9, 1823 – June 5, 1893)), November 3, 1855, p. 1
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 6188

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.