Cloud Under Siege: 6 Cloud Breaches and Leaks in Spring 2025

The hits keep coming – from surveillance apps leaking plaintext chats of government officials, to your favorite cloud vendors being used against you. Misconfigurations, stale creds, and misplaced trust are fueling the surge. Examining real-world examples of how threat actors are abusing cloud-native environments is a great way to validate and continuously improve readiness and security posture. Here’s a breakdown of six recent cloud attacks, what we can all learn from them, and steps we can take to increase security.

1. TeleMessage “Signal Clone” Breach

Date Reported: May 2025

AWS services: EC2, IAM, S3 (underlying infra)

Exploit path: Hardcoded creds and an exposed archive service handed over plaintext logs – yes, logs – of a Signal clone to an attacker in under 20 minutes.

Impact: Contacts, chats, and internal credentials from hundreds of users, including U.S. government officials and companies like Coinbase.

Why it matters: They sold compliance and encryption; they delivered a plaintext bonfire on AWS.

What you can do:

  • Scan code regularly (SAST\DAST) to detect and mitigate hardcoded credentials.
  • Use .gitignore and .env files when dealing with secrets in Git based repositories.
  • Hunt for potential secrets that might lurk in commits, as anyone that could access the repo could find them.
  • Manage secrets securely using AWS Secrets Manager or any other Vault solutions.
  • Minimize secrets scopes and limit them specifically to the resources being used.
  • Implement least privilege access controls to minimize potential impact when creating or using secrets.

2. Ticket Resale Platform Leaks Half a Million Records

Date Reported: May 2025

AWS services: Likely EC2 or RDS (self-hosted DB)

Exploit path: Wide-open DB – no password, no VPC, no shame.

Impact: 520,000+ customer records: barcodes, names, partial cards. 200 GB of user data exposed.

Why it matters: Storing PII in the cloud without proper safeguards can expose customers and businesses to significant risk and misconfigured databases are a common attack vector.

What you can do:

  • Enforce mandatory authentication (managed identity such as SSO) on databases.
  • Deploy databases within secure VPCs.
  • Regularly audit databases for public exposure, data sensitivity and potential access paths.

3. WorkComposer Dumps 21 Million Screenshots via S3

Date reported: April 2025

AWS services: S3

Exploit path: Unauthenticated bucket, business as usual.

Impact: 21M screenshots of people working – chats, passwords, source code, etc.

Why it matters: It’s not surveillance anymore – it’s a feed for anyone with a browser and bad intentions.

What you can do:

  • Apply restrictive bucket policies and IAM rules.
  • Enable S3 Access Analyzer to identify unintended public access.
  • Continuously monitor and audit S3 permissions.

4. 1,229 AWS Keys Used for SSE-C Ransomware

Date reported: April 2025

AWS services: IAM, S3, SSE-C

Exploit path: Stolen keys turned into encryption bombs using AWS-native tools. No malware needed.

Impact: Dozens of orgs got their S3 data locked with ransom notes left behind.

Why it matters: Cloud ransomware without payloads. Just creds, buckets, and your own KMS against you.

What you can do:

  • Aggressively rotate and revoke AWS keys regularly (yes, even on a daily basis!)
  • Enable CloudTrail and set up anomaly alerts for unusual encryption activity.
  • Limit key permissions strictly to in-scope and relevant resources.

5. SSRF to IMDSv1 Credentials Theft, Again

Date reported: April 2025

AWS services: EC2 (IMDSv1)

Exploit path: SSRF bugs used to siphon short-lived IAM creds from 169.254.169.254.

Impact: Thousands of EC2 instances probed. Real creds stolen.

Why it matters: IMDSv1 still exists. 

What you can do:

  • Disable IMDSv1, enforce IMDSv2.
  • Implement web application firewalls (WAF) to detect and mitigate SSRF attacks.
  • Regularly assess web applications for SSRF vulnerabilities.

6. JavaGhost Hijacks SES for Stealth Phishing

Date reported: March 2025

AWS services: IAM, SES, WorkMail

Exploit path: Long-lived creds abused to spin up SES senders and blast phishing from real accounts.

Impact: Victims sent mail they didn’t write – phish that passed SPF and DKIM.

Why it matters: When attackers hijack your cloud email infrastructure, their phishing emails look legitimate to recipients and security tools alike – passing traditional authentication checks.

What you can do:

  • Regularly rotate and monitor IAM credentials.
  • Use short-lived credentials and multi-factor authentication (MFA).
  • Deploy anomaly detection tools for SES usage patterns.

Trends & Mitigation

The volume of cloud attacks continues to rise. In many cases, the scale of cloud adoption has outpaced security. Many recent incidents don’t involve zero-day exploits, but rather misconfigurations and overlooked access points. Attackers are increasingly leveraging cloud-native services like KMS, SES, and IMDS as designed, which makes their activity harder to detect and mitigate.

Best practices to consider:

  • Conduct regular asset inventory and configuration audits.
  • Demand transparency and security guarantees from vendors.
  • Enforce strict policies against credential reuse and hardcoding.
  • Apply rate limits and monitor cloud services for anomalous activity.
 

Enhanced mitigation steps:

  • Enforce IMDSv2: Mandate use of IMDSv2 across all instances.
  • Aggressive Key Rotation: Implement automated systems to regularly rotate keys and monitor usage.
  • Default Deny Policy: Deny public access by default; explicitly permit access when absolutely necessary.
  • Comprehensive Monitoring: Enhance visibility with CloudTrail, GuardDuty, and CloudWatch to detect anomalies.
  • Vendor Verification: Regular security audits of vendors, including data handling practices.


Remember, cloud security thrives on proactive vigilance. By systematically addressing potential weaknesses and reinforcing best practices, you ensure your cloud environment remains secure and resilient, prepared for both current threats and future challenges.

To see how ZEST delivers proactive exposure management & remediation across cloud, applications and software supply chain, reach out to our team.  

Share the Post:

Related Resources

Cloud Under Siege: 6 Cloud Breaches and Leaks in Spring 2025

The hits keep coming – from surveillance apps leaking plaintext…

Thousands of organizations at risk by Salesforce Industry Cloud bugs

Snir Ben Shimol, co-founder and CEO of Zest Security, said…

ZEST Security Integrates with Upwind

ZEST Security announced its strategic integration with Upwind combining runtime…

From Managing to Resolving: Transforming Vulnerability Management for Cloud

ZEST Security and Upwind Partner to Close the Gap Between Cloud Threat Detection and Action

ZEST Security and Upwind have launched a new integration that…

Runtime Visibility Meets Intelligent Remediation: ZEST + Upwind

The complexity of cloud environments and modern applications demands specialized,…

How Malicious AWS Lambda Layers Can Compromise Your Serverless Environment

AWS Lambda Layers are a powerful feature that enables developers…

RSA Conference 2025 – Pre-Event Announcements Summary

ZEST Security announced the launch of its Multi-Agent AI System,…

ZEST AI Agents: Risk Remediation, Reimagined

Risk remediation is broken. Security teams are overwhelmed, drowning in…

ZEST Security Unveils Multi-Agent AI System to Autonomously Remediate and Mitigate Cloud Risks at RSAC 2025

NEW YORK/RSAC, April 22, 2025 – ZEST Security, provider of…

AWS Organizations and Delegated Administrator: Security Pros and Cons

Introduction AWS Organizations is a service that enables centralized governance…

ZEST for Cloud Security Risk Resolution

How ZEST streamlines remediation and mitigation of cloud security risks…

7 RSAC 2025 Cloud Security Sessions You Don’t Want to Miss

Some of the brightest minds in the industry will discuss…

Understanding Preemptive Exposure Management and Why it Matters

Last week, Gartner® released a new emerging technology report on…

ZEST Platform Now Available in AWS Marketplace

We are excited to announce that ZEST Security’s Agentic-AI Risk…

How to go From Zero to a Well-Secured, Managed Cloud Security State

Building an effective cloud security risk management program can seem…

Google’s $32 Billion Wiz Buy Bolsters Its Cloud Security Capabilities, Experts Say

Google Cloud aims to harness Wiz’s expertise and Mandiant’s threat…

Aaron Brown Joins ZEST Security’s Advisory Board

Today we are excited to officially announce that Aaron Brown,…

$32 billion Google-Wiz deal bodes well for cloud security, experts say

Cloud industry leaders such as Snir Ben Shimol, co-founder and…

Building a Cloud Security Program That Actually Works

In this webinar, we discuss essential best practices and milestones…

Code to Cloud and Back: Closing the Remediation Loop

What is Code to Cloud? Everyone is in the cloud,…

The Future of Cloud Security and the Role of AI

With the visibility challenge largely addressed, what’s next? How will…

ZEST Security’s Cloud Risk Exposure Impact Report Reveals 62% of Incidents are Related to Risks Known to the Organization

ZEST Security, provider of an Agentic-AI Cloud Risk Resolution platform,…

4 Reasons Cloud Security Risk Management is Adopting an Incident Response Mentality

The high volume of alerts, combined with tedious and manual…

Stat of the week

Cybersecurity professionals have to always have one eye on the…

Cloud security report shows growing remediation gap amid increased risk awareness

Attackers now exploit vulnerabilities within an average of five days,…

Beyond CVSS: Why EPSS and KEV Are Game-Changers for Prioritizing Vulnerabilities

Publicly disclosed computer vulnerabilities are organized into a globally recognized…

Cloud risks rise due to slow remediation, costs USD $2m+

The study reports that organisations face an annual remediation cost…

Resilient Cyber Newsletter #33

ZEST’s Cloud Risk Exposure Impact Report provided a handful of…

Over 60 percent of enterprise cybersecurity incidents relate to known risks

“There is a direct correlation between delays in remediation and…

Resolving your cloud risks with ZEST!

Zest Logo

“62% of Incidents are Related to Risks Known to the Organization”