Blog Image

Spike in Cloud Ransomware Threats: SANS Warnings

08 Jul 2025

A recent SANS Institute study highlighted that 66% of cloud storage buckets contain sensitive information, making them prime targets for ransomware 
reddit.com
. Malicious actors are now exploiting legitimate cloud tools—such as AWS encryption and versioning—against organizations themselves.

Techniques Used by Attackers:

Abuse of encryption frameworks: Attackers leverage S3 encryption APIs to lock data without deploying malware.

Object-level deletion with versioning: They delete data and its backups, rendering self-recovery impossible.

Targeted access control bypass: Gaining IAM privilege to escalate and execute attacks.

Risks & Impacts:

Disruption even in fully "backed-up" environments.

Anti-malware tools may not detect these operations.

Cloud-native mechanisms, when misused, become hazard vectors.

Prevention Strategies:

Enable immutable backups: Prevent deletion or modifications, even by root.

Use separate recovery accounts: Storage/data operations restricted through walled VM perimeters.

Monitor API logs: If used maliciously, detect anomalous deletion/encryption behavior.

Implement service-level versioning: Backup copies stored securely off main account.

Penetration testing: Include cloud-natively—simulate object deletion scenarios.

Bottom Line:
Cloud isn't inherently safe; native tools can be turned into attack vectors. SANS’s warning is a wake-up call—organizations must rethink cloud backup architecture through zero trust and hardened IAM controls.