Home » Tech » Cloud Identity Attacks: How Recruiters Are Delivering Cloud Breaches in Minutes

Cloud Identity Attacks: How Recruiters Are Delivering Cloud Breaches in Minutes

by Lisa Park - Tech Editor

The New IAM Pivot: How Recruitment Fraud Fuels Cloud Breaches

A seemingly legitimate LinkedIn message, a coding assessment, and a downloaded package – that’s all it takes for attackers to gain access to sensitive cloud credentials and potentially compromise entire cloud environments. This increasingly common attack chain, dubbed the “IAM pivot,” is exploiting a fundamental gap in how enterprises monitor identity-based attacks, and the scale is staggering. Adversaries are now operating at an industrial level, with one unit alone amassing over $2 billion through cryptocurrency operations linked to these breaches.

The attack bypasses traditional email security defenses. Instead of phishing emails, attackers are leveraging platforms like WhatsApp and LinkedIn to deliver trojanized Python and npm packages through recruitment-themed lures. Once a developer installs the malicious package, their cloud credentials – including GitHub personal access tokens, AWS API keys, and Azure service principals – are exfiltrated, granting attackers immediate access. Crucially, this happens before any corporate security systems can intervene.

From Credentials to Cloud Admin in Minutes

The speed of these attacks is alarming. Recent research documented by Sysdig demonstrated a complete pivot to cloud administrator privileges in just eight minutes, traversing 19 IAM roles before targeting AI infrastructure. This isn’t a slow, methodical exploit; it’s a rapid, automated process leveraging valid credentials.

The Cybersecurity and Infrastructure Security Agency (CISA) and JFrog have tracked overlapping campaigns targeting the npm ecosystem, identifying 796 compromised packages spreading through infected dependencies. The initial compromise often occurs through messaging apps, bypassing corporate email gateways entirely.

Dependency Scanning Isn’t Enough

While dependency scanning can identify the malicious package itself, it’s insufficient to prevent the attack. The critical vulnerability lies in the runtime – the moment the package is installed and begins exfiltrating credentials. Most security stacks lack the ability to detect this credential exfiltration in real-time. “When you strip this attack down to its essentials, what stands out isn’t a breakthrough technique,” says Shane Barney, CISO at Keeper Security, “It’s how little resistance the environment offered once the attacker obtained legitimate access.”

Attackers are adapting their tactics, moving away from traditional typosquatting and instead hand-delivering malicious packages through personal messaging channels. CrowdStrike Intelligence research shows adversaries tailoring lures to specific industries and deploying specialized malware, with FinTech firms being a prime target as recently as June 2025.

The Weak Link: Cloud Misconfigurations and Weak Credentials

Google Cloud’s Threat Horizons Report consistently reveals that weak or absent credentials account for a significant portion of cloud incidents – 47.1% in the first half of 2025 – with misconfigurations adding another 29.4%. This isn’t a new threat; it’s a chronic condition.

The problem isn’t just gaining access; it’s the lack of monitoring once inside. Attackers with valid credentials don’t need to exploit vulnerabilities; they simply log in and move laterally. This is where Identity Threat Detection and Response (ITDR) comes into play. ITDR focuses on monitoring identity behavior within cloud environments, rather than just authentication, providing visibility into lateral movement and anomalous activity.

AI Infrastructure in the Crosshairs

The rise of AI infrastructure adds another layer of complexity. AI gateways validate authentication to models and training pipelines, but they don’t assess behavioral consistency. A compromised developer account could, for example, begin enumerating every available model and disabling logging – actions an ITDR solution would flag as anomalous.

The interconnectedness of AI systems, exemplified by open-source agents like OpenClaw, further expands the potential blast radius. OpenClaw, which connects to email, messaging platforms, and code execution environments, provides a powerful tool for attackers to automate lateral movement and execute objectives across infrastructure. CrowdStrike CTO Elia Zaitsev warns that a successful prompt injection against an AI agent isn’t just a data leak; it’s a potential foothold for automated attacks.

Where Control Gaps Exist

The attack chain can be broken down into three stages, each with specific control gaps:

  • Entry: Trojanized packages delivered through non-email channels bypass traditional security. Gap: Lack of runtime behavioral monitoring. Action: Deploy monitoring on developer workstations to flag credential access during package installation.
  • Pivot: Stolen credentials enable IAM role assumption. Gap: Absence of behavioral baselines for cloud identity usage. Action: Implement ITDR to monitor identity behavior and detect lateral movement.
  • Objective: AI infrastructure trusts authenticated identities without behavioral evaluation. Gap: AI gateways validate tokens but not usage patterns. Action: Implement AI-specific access controls and enforce logging that cannot be disabled by the accessing identity.

As Jason Soroko, senior fellow at Sectigo, points out, the fundamental issue often boils down to basic security hygiene. Exposed credentials in public storage buckets and a failure to master security fundamentals create opportunities for attackers to exploit.

What to Validate in the Next 30 Days

Organizations need to audit their IAM monitoring stacks against this three-stage attack chain. The perimeter is no longer the primary defense; identity is. Focusing on runtime behavioral monitoring, cloud identity baselines, and AI-specific access controls are crucial steps in mitigating this evolving threat.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.