

The 90,000 Credential Wake-Up Call
9 snips Jun 26, 2025
Nathaniel Quist, a leader in Cloud Threat Intelligence at Palo Alto Networks, dives into a staggering cloud extortion campaign that revealed over 90,000 credentials. He explains how a minor misconfiguration opened the floodgates and emphasizes the weaknesses in identity management. Automation's dual role as both a boon and a risk in cloud security is discussed, along with the critical need for collaboration between cybersecurity teams and cloud providers. Quist also shares strategies for building a robust cloud posture and enhancing threat detection.
AI Snips
Chapters
Transcript
Episode notes
Environment Variable Files Are Keys
- Environment variable files store credentials for app communication with backend resources in the cloud.
- If exposed due to misconfiguration, they become high-value targets granting access to sensitive systems.
Attackers' Cloud Playbook
- Attackers use exposed environment variable files to discover accessible resources and escalate permissions.
- They then create serverless functions or resources to execute operations within the cloud environment.
Build Solid Cloud Posture Foundations
- Establish strong cloud posture by eliminating misconfigurations and avoiding public exposure of sensitive components.
- Apply data flow security so only authorized applications access data to maintain a robust cloud foundation.