Credential Theft Endangers Cloud Environments in 2025

Blog Cloud Security
7 Best Practices for a Cloud Detection and Response Framework

In an increasingly cloud-dependent business landscape, a disturbing trend has emerged that threatens the very foundation of cloud security: credential theft. Recent incidents and reports indicate a dramatic surge in credential theft attacks and subsequent abuse. This indicates potentially devastating implications for cloud environments where a single compromised credential can provide access to vast troves of sensitive data and critical infrastructure.

The Alarming Rise in Credential Theft

According to the Red Report 2025, credential theft incidents have spiked by an unprecedented 300% compared to previous years. This dramatic increase positions credential theft as the preferred attack vector for cybercriminals in 2025 so far, surpassing other traditional methods like ransomware and DDoS attacks in both frequency and effectiveness (it is important to note, that stolen credential also facilitate Ransomware attacks, as highlighted in the Coalition threat report).

The surge is largely driven by the widespread use of infostealer malware, automated tools that are designed specifically to harvest credentials and authentication tokens from compromised systems. Flashpoint’s research indicates that infostealers saw significant growth throughout 2024, and their use continued  to grow into 2025.

How Criminals Are Stealing Cloud Credentials

ESecurity Planet reports that infostealer malware has evolved dramatically in 2025, with new variants specifically engineered to target cloud service tokens and credentials. Modern infostealers can extract credentials from:

  • Browser storage
  • Configuration files
  • Environment variables
  • Cloud CLI tools
  • Authentication cookies
  • Password managers

Social Engineering Tactics

Dark Reading highlights that cybercriminals continue to rely heavily on social engineering tactics to obtain cloud credentials:

  • Phishing campaigns mimicking cloud service providers
  • Business email compromise focusing on cloud service administrators
  • Vishing (voice phishing) attacks targeting help desk personnel
  • Social media reconnaissance to craft targeted impersonation attempts

 

Spotlight: The Daisy Cloud Hacker Group

One of the most sophisticated threat actors specializing in cloud credential theft is the Daisy Cloud hacker group, which has exposed over 30,000 login credentials across various cloud platforms. The group has developed a highly structured approach to credential theft that specifically targets cloud environments, and is conducting extremely efficient and rapid operations at scale (aided by automation tools) that gain initial target multi-cloud environments, mainly via sophisticated phishing. Then, upon obtaining valid credentials, the group employs automated scripts that:

    • Test credential validity across multiple cloud services (exploiting password reuse)
    • Establish persistence mechanisms such as creating secondary accounts or API keys
    • Implement obfuscation techniques to avoid detection by security monitoring systems

Afterwards, they use these credentials to attack organization. They shy away from “noisy” Ransomware attack, but focus instead on covert exfiltration of valuable data, which is then monetized through:

    • Direct sale on specialized dark web marketplaces
    • Targeted extortion of affected organizations
    • Licensing access to compromised environments to other criminal groups

The group’s activity demonstrates that cloud environments are an attractive target for credential theft attacks. The results? Stolen credentials have been linked to 67% of major cloud data breaches in early 2025.

Mitigation

As credential theft techniques continue to evolve, cloud security strategies must adapt accordingly. As noted abov, credential theft  and abuse is quickly becoming the most notable threat to cloud environments. On one hand, organizations are required to prioritize credential protection. On the other, they must also strengthen their cloud security defenses. By implementing robust access controls, using multi-factor authentication, educating staff, and regularly monitoring cloud environments, businesses can reduce the risk of credential theft and ensure the ongoing safety of their data and infrastructure.

Skyhawk Security’s Continuous Proactive Protection helps organizations identify their crown jewel assets and then the GenAI-based red team and blue team see how defenses hold up against an cloud attacks- especially ones that involves stolen credentials.

Try it for free today!

Blog

In an increasingly cloud-dependent business landscape, a disturbing trend has emerged that threatens the very foundation of cloud security: credential theft. Recent incidents and reports indicate a dramatic surge in credential theft attacks and subsequent abuse. This indicates potentially devastating

Blog

For the second year in a row, Skyhawk Security stands out in a competitive market! The organization is proud to announce that it has been named a finalist in the 2025 Cloud Security Awards program in two categories: Best Cybersecurity

Blog

Skyhawk Security started in the 3rd generation of Cloud Threat Detection and Response (CDR) platforms at its inception in May of 2022, supporting AWS, Azure, and Google Cloud to deliver a robust Preemptive Cloud Security Platform. The several layers of

Blog

In recent Gartner® research, Emerging Tech Disruptors: Top 5 Early Disruptive Trends in Cybersecurity for 2025, it is noted that there will be a shift from detection and response to preemptive cyber defense using key AI-advancements like Simulation Digital Twins.

Blog

As cloud adoption continues to gain traction, so do the risks and challenges of its security. The latest Google Cloud Threat Horizons Report for the first half of 2025, titled:” Evolving Ransomware and Data Theft Risks in the Cloud”, highlights

Cloud BreachAICloud SecurityThreat Detection
Blog

The digital transformation of industries worldwide has been powered by advancements in Information Technology (IT). Over the past two decades, IT has reshaped nearly every facet of modern life, from communication to commerce, especially in developing countries. Within this growth,

Cloud BreachAICloud SecurityThreat Detection
See the Purple Team
See the breach before it happens
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.