LIVE NEWS
  • Trump says Iran war will end ‘very soon’
  • AI is supercharging cloud cyberattacks – and third-party software is the most vulnerable
  • New summit in Colombia seeks to revive stalled UN talks on fossil fuel transition
  • Trump administration widens probe of 2020 election as it obtains records from Arizona
  • Scientists found a surprising way to make exercise work better
  • I use ESP32 as a VPN gateway for my whole network — here’s how
  • Where do the 35 million foreigners living in the GCC come from? | Infographic News
  • Circle (CRCL) shares continued their rally on Monday
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Artificial Intelligence»AI is supercharging cloud cyberattacks – and third-party software is the most vulnerable
Artificial Intelligence

AI is supercharging cloud cyberattacks – and third-party software is the most vulnerable

primereportsBy primereportsMarch 10, 2026No Comments6 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
AI is supercharging cloud cyberattacks – and third-party software is the most vulnerable
Share
Facebook Twitter LinkedIn Pinterest Email


AI is supercharging cloud cyberattacks – and third-party software is the most vulnerable

Westend61 via Westend61 / Getty Images

Follow ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • AI is helping attackers exploit vulnerabilities faster than ever.
  • Most cloud attacks now target weak third-party software.
  • Businesses need automated, AI-powered defenses to keep up.

The jury is still out on whether most businesses get any measurable benefit from implementing AI in their organizations, and the debate is likely to get more contentious over time.

But at least one sector is reaping massive productivity gains in the Age of AI: Cybercriminals are more successful than ever before at leveraging vulnerabilities to attack businesses in the cloud, where they’re most vulnerable.

Also: AI agents of chaos? New research shows how bots talking to bots can go sideways fast

That’s the conclusion of a just-released report from Google’s army of security investigators and engineers that I was able to review in advance of its publication. Based on its observations from the second half of 2025, Google Cloud Security concluded, “The window between vulnerability disclosure and mass exploitation collapsed by an order of magnitude, from weeks to days.”

The report concludes that the best way to fight AI-powered attacks is with AI-augmented defenses: “This activity, along with AI-assisted attempts to probe targets for information and continued threat actor emphasis on data-focused theft, indicates that organizations should be turning to more automatic defenses.”

Sneaking in through third-party code

These days, Google’s report notes, security threats are not targeting the core infrastructure of services like Google Cloud, Amazon Web Services, and Microsoft Azure. Those high-value targets are well secured. Instead, threat actors (a polite name that includes both criminal gangs and state-sponsored agents, notably from North Korea) are aiming attacks at unpatched vulnerabilities in third-party code.

Also: Will AI make cybersecurity obsolete or is Silicon Valley confabulating again?

The report contains multiple detailed examples of these attacks — with victims not mentioned by name. One involved exploitation of a critical remote code execution (RCE) vulnerability in React Server Components, a popular JavaScript library used for building user interfaces in websites and mobile apps; those attacks began within 48 hours of the public disclosure of the vulnerability (CVE-2025-55182, commonly referred to as React2Shell).

Another incident involved an RCE vulnerability in the popular XWiki Platform (CVE-2025-24893) that allowed attackers to run arbitrary code on a remote server by sending a specific search string. That bug was patched in June 2024, but the patch wasn’t widely deployed, and attackers (including crypto mining gangs) began exploiting it in earnest in November 2025.

Also: AI’s scary new trick: Conducting cyberattacks instead of just helping out

A particularly juicy account involves a gang of state-sponsored attackers known as UNC4899, probably from North Korea, that took over Kubernetes workloads to steal millions of dollars in cryptocurrency. Here’s how the exploit took place:

UNC8499 targeted and lured an unsuspecting developer into downloading an archive file on the pretext of an open source project collaboration. The developer soon after transferred the same file from their personal device to their corporate workstation over Airdrop. Using their AI-assisted Integrated Development Environment (IDE), the victim then interacted with the archive’s contents, eventually executing the embedded malicious Python code, which spawned and executed a binary that masqueraded as the Kubernetes command-line tool. The binary beaconed out to UNC4899-controlled domains and served as the backdoor that gave the threat actors access to the victim’s workstation, effectively granting them a foothold into the corporate network.

Another incident involved a series of steps that started with a compromised Node Package Manager package that stole a developer’s GitHub token and used it to access Amazon Web Services, steal files stored in an AWS S3 bucket, and then destroy the originals. That all happened within a matter of 72 hours.

Compromising identity

The other major finding is a shift away from attacking weak credentials with brute force attacks in favor of exploiting identity issues through a variety of techniques:

  • 17% of cases involved voice-based social engineering (vishing)
  • 12% relied on email phishing
  • 21% involved compromised trusted relationships with third parties
  • 21% involved actors leveraging stolen human and non-human identities
  • 7% resulted from actors gaining access through improperly configured application and infrastructure assets

And the attackers aren’t always coming from far away; the report notes that “malicious insiders” — including employees, contractors, consultants, and interns — are sending confidential data outside the organization. Increasingly, this type of incident involves platform-agnostic, consumer-focused cloud storage services like Google Drive, Dropbox, Microsoft OneDrive, and Apple iCloud. The report calls this “the most rapidly growing means of exfiltrating data from an organization.”

Also: OpenClaw is a security nightmare – 5 red flags you shouldn’t ignore (before it’s too late)

One ominous note is that attackers these days are taking their sweet time before making their presence known. “45% of intrusions resulted in data theft without immediate extortion attempts at the time of the engagement, and these were often characterized by prolonged dwell times and stealthy persistence.”

What can businesses do to protect themselves?

Each section of the report includes recommendations for IT professionals to follow for securing cloud infrastructure. Those guidelines are neatly divided into two categories: specific advice for Google Cloud customers and more general guidance for customers using other platforms.

Also: Rolling out AI? 5 security tactics your business can’t get wrong – and why

If you’re an admin at a large organization with security responsibilities, that advice is worth reading carefully and adding to existing security measures. But what are small and medium-sized businesses supposed to do?

  • Step up your patching game by ensuring that all software applications, especially those from third-party developers, are updated automatically.
  • Strengthen Identity and Access Management, using multi-factor authentication and ensuring that only authorized users have access to administrative tools.
  • Monitor the network with an eye toward identifying unusual activity and data movement. That includes attacks from the outside as well as insider threats.
  • Have an incident response plan ready to go at the first sign of an intrusion. Those first few hours can be a crucial time, and scrambling to assemble investigative and containment resources can take days if you’re not prepared.

For small businesses that don’t have security experts on staff, the best solution is to find a managed service provider that has the skills and experience you need. You do not want to be starting that search after an attacker has already succeeded.



Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew summit in Colombia seeks to revive stalled UN talks on fossil fuel transition
Next Article Trump says Iran war will end ‘very soon’
primereports
  • Website

Related Posts

Artificial Intelligence

City Union Bank launches AI centre to support banking operations

March 9, 2026
Artificial Intelligence

A Coding Guide to Build a Complete Single Cell RNA Sequencing Analysis Pipeline Using Scanpy for Clustering Visualization and Cell Type Annotation

March 9, 2026
Artificial Intelligence

Oil Above $100 Raises Inflation Concerns as Gulf Supply Routes Tighten

March 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20255 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Trump says Iran war will end ‘very soon’
  • AI is supercharging cloud cyberattacks – and third-party software is the most vulnerable
  • New summit in Colombia seeks to revive stalled UN talks on fossil fuel transition
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.