Home Cybersecurity Disaster Recovery Identity Security AI Governance Sectors IT Services About Insights Contact
Governance

Why Cloud Attackers Stopped Caring About Your Passwords

10 March 2026 · 3 min read

← All insights

Google's H1 2024 Cloud Threat Horizons report delivers an uncomfortable truth for UK businesses: attackers have largely abandoned the password theft playbook. Instead of breaking down your front door, they're walking through application vulnerabilities you didn't know existed. The React2Shell campaign exemplifies this shift, demonstrating how modern threat actors exploit cloud services directly rather than bothering with credential theft.

The New Attack Vector: Applications, Not Access

The React2Shell campaign targeted exposed application interfaces across major cloud platforms, completely bypassing traditional identity controls. Attackers identified misconfigured APIs, unpatched application vulnerabilities, and exposed management interfaces to gain direct access to cloud resources. This approach renders multi-factor authentication and strong password policies largely irrelevant—the attacker never encounters your login screen.

Google's data shows a 300% increase in application-layer attacks against cloud infrastructure over the past year. These attacks succeed because most organisations secure their perimeter whilst leaving applications inadequately protected. Your carefully crafted identity governance framework becomes meaningless when attackers can manipulate your applications directly through exposed APIs or unpatched vulnerabilities.

Why Traditional Controls Are Failing

UK businesses typically approach cloud security through an identity-first lens, implementing robust authentication policies and privileged access management. This made sense when attackers primarily targeted user credentials through phishing or password spraying. However, React2Shell demonstrates how attackers now prefer exploiting the applications themselves rather than the accounts that use them.

The fundamental issue is that traditional identity governance treats applications as trusted endpoints. Once authenticated, users—and by extension, compromised applications—can often access far more resources than necessary. This 'castle and moat' mentality assumes that strong perimeter security protects everything inside, but modern cloud architectures blur these boundaries beyond recognition.

The Application Security Gap

Most organisations implement Cyber Essentials or ISO 27001 controls focused on user access management but lack equivalent rigour for application security. Google's findings show attackers exploiting container misconfigurations, serverless function vulnerabilities, and inadequately secured CI/CD pipelines—areas rarely addressed by traditional identity frameworks.

The React2Shell campaign succeeded by targeting organisations that had strong identity controls but weak application security posture. Attackers identified exposed Kubernetes dashboards, misconfigured storage buckets, and unpatched application frameworks to gain initial access, then moved laterally through environments using legitimate application protocols and APIs.

Beyond Zero Trust: Application-Centric Security

The solution requires moving beyond user-centric security models to application-centric approaches. This means treating every application component as potentially compromised and implementing controls at the application layer itself. Rather than asking 'who is this user?', organisations must ask 'what is this application trying to do, and should it be allowed?'

This shift demands runtime application security monitoring, API security gateways, and continuous vulnerability management integrated into development workflows. It also requires rethinking privilege models—applications should receive only the minimum permissions necessary for their specific function, with those permissions continuously validated and adjusted.

The Board-Level Response

Boards should immediately assess whether their current security investments align with this threat landscape shift. Commission a review of application security controls across your cloud estate, focusing on API exposure, container security, and CI/CD pipeline protection. Ensure your security team has visibility into application behaviour, not just user behaviour. The organisations that adapt their security thinking from 'who can access what' to 'what applications can do what' will be the ones that remain secure as attackers continue evolving past traditional access controls.

Mohammad Ali Khan
Director, Pacific Technology Group · LinkedIn ↗

Related Reading

Google Cloud Attack Vector Shift: Why Bug Exploits Now Outpace Weak Credentials — Google's security team reveals a fundamental shift: attackers now exploit software vulnerabilities faster than weak pass

Strengthen your organisation's security posture

Take the PTG Cyber Assessment Speak With Our Advisory Team

Ready to strengthen your cyber resilience?

Talk to our team about protecting your organisation against evolving threats.

Get in Touch