Cloud Security
Researchers flag cross-cloud recon tactic

Cloud computing data center. Storage cloud on blur computer data center background. 3d illustration (Adobe Stock)
Security researchers have identified and addressed a privilege escalation flaw in Google Cloud Platform's Cloud Functions and Cloud Build services, highlighting broader concerns about cross-platform vulnerabilities, according to Infosecurity Magazine. Initially uncovered by Tenable Research, the flaw allowed attackers to gain elevated access during the deployment process. Google has since released a patch to limit the privileges of default Cloud Build accounts. Cisco Talos later extended the findings, demonstrating how a similar technique, using a malicious “package.json file,” could be repurposed for reconnaissance across other cloud platforms such as AWS Lambda and Azure Functions. While Google’s fix has neutralized the original threat, Talos showed that the method could still enable environment enumeration without requiring privileged credentials. Techniques observed include network mapping, user and OS detail scans, and container identification. Google has introduced more granular service account controls, but experts stress the need for least-privilege enforcement, routine permission audits, and vigilant monitoring to defend against evolving cloud-native threats.
An In-Depth Guide to Cloud Security
Get essential knowledge and practical strategies to fortify your cloud security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds