Skip to main content

The Flavor of Clouds: Are Some Cloud Platforms More Attractive to Attackers?

Significant financial loss and sensitive data exposure continue to be a significant risk for entities that host systems in the cloud. Identifying if attackers prefer attacking systems hosted in one cloud provider over another could assist architects and engineers in selecting a provider.

Honeypots were deployed to Amazon Web Services (AWS), Azure, and Google Cloud Platform, incorporating a Social Engineering lure to measure human interaction and bot interactions to determine if attackers preferred one cloud provider over another. The data analysis did not identify human interactions, leaving only bot interactions for further examination. Hosting providers that hosted the bots were identified by enriching the data during analysis.

The results showed that the SSH server hosted in AWS experienced significantly fewer attacks, and far fewer attacks originated from AWS. Determining causation from this metric alone was not possible. AWS is likely employing undocumented mitigation strategies, attackers may prefer other clouds over AWS, or resources are allocated based on the number of usernames used in the attacks against SSH.

The data also showed that a very low percentage of bots attacked all three cloud providers overlapped with one another, indicating that bot herders are configuring attack infrastructure to focus on particular clouds rather than directing bots to crawl the internet mindlessly. Bots were tailored to the environments they attacked based on analysis of how they interacted with the web servers. Defenders, engineers, and architects should not deviate from required and selected security frameworks regardless of attacker preferences that may be identified.

SANS_Flavor_Clouds_Are_Some_Cloud_Platforms_More_Attractive_Attackers (PDF, 0.48MB)

17 Feb 2025
ByJames Smith
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

Cloud Security Groundhog Day: Avoiding Recurring Mistakes in a Dynamic Landscape

Research Paper

Download the SANS ebook and learn how to strengthen your cloud and AI security strategies.

  • 16 Oct 2025
  • Dr. Anton Chuvakin, Dr. Paul Vixie, Frank Kim, Simon Vernon, Brandon Evans, Dave Shackleford, Wesley Kuzma

ZTA Unpacked: The Critical Technical Components of Zero Trust Architecture

Research Paper

This paper demystifies the technical foundation of Zero Trust Architecture (ZTA) and outlines the key technologies that drive modern, mature implementations. 

  • 15 Aug 2025
  • Greg Scheidel

Navigating the Challenges of Securing Hybrid Environments

Research Paper

This paper explores ways to bring clarity and control back to your hybrid security strategy—with practical guidance on Zero Trust, unified monitoring, and the evolving role of AI in modern defense.

  • 24 Jul 2025
  • Matt Bromiley

Securing Azure with PIM: A Just-in-Time Access Study

Research Paper

This study assesses Azure Privileged Identity Management (PIM) and its Just-in-Time access model within a controlled Azure environment, simulating enterprise scenarios across Azure Subscription Roles.

  • 11 Jul 2025

Resiliency and Business Continuity in the Cloud Era

Research Paper

In this white paper, Dave Shackleford unpacks today’s evolving cloud threat landscape.

  • 21 May 2025
  • Dave Shackleford

Out-of-Band Defense: Securing VPNs from Password-Spray Attacks with Cloud Automation

Research Paper

This research examines an out-of-band solution to detect and block password-spray attacks on Remote Access VPN services, addressing vulnerabilities like Cisco’s CVE-2024-20481 amid rising threats post-COVID-19.

  • 12 May 2025
  • SANS Institute

Securing the Future with Microsoft Defender for Cloud: Best Practices and Insights

Research Paper

In this paper, you’ll learn how to enhance your cloud security posture through actionable insights and use cases involving Microsoft Defender for Cloud.

  • 26 Mar 2025
  • Dave Shackleford

Detecting Azure Hybrid Machine Attack Paths with Graph Theory

Research Paper

This research extends the data collected by the security tool BloodHound to uncover hidden connections between on-premises devices and their cloud identities within an Azure environment.

  • 7 Jan 2025

Cloud Security Monitoring on AWS

Research Paper

Cloud services adoption is growing massively year over year. In most cases, moving to the cloud...

  • 8 Feb 2021

Firebase: Google Cloud's Evil Twin

Research Paper

Firebase allows a frontend application to connect directly to a backend database. Security wonks...

  • 8 Oct 2020
  • Brandon Evans

Compliance Benchmarks using Cloud Custodian

Research Paper

With the increased cloud adaption rate, many companies are looking for ready to use product...

  • 25 Sep 2020

Top 5 Considerations for Multicloud Security

Research Paper

The move to leveraging multiple public cloud providers introduces new challenges and opportunities...

  • 15 Apr 2020
  • Brandon Evans

Cybersecurity in the Age of the Cloud

Research Paper

The hand-selected resources in this eBook provide a well-rounded look at cybersecurity...

  • 21 Feb 2020
  • Frank Kim

Secure Internet Gateways: Backing Down from a Fight

Research Paper

When does a security agent become a double agent? On-premise corporate devices are protected by a...

  • 2 Nov 2018

Intrusion detection through traffic analysis from the endpoint using Splunk Stream

Research Paper

With technologies such as software-defined wide area networking (SD-WAN) and cloud operations, the...

  • 24 May 2017

Cyber Security Trends: Aiming Ahead of the Target to Increase Security in 2017

Research Paper

Attackers are always changing their methods, but some cybersecurity trends are clear--and...

  • 20 Mar 2017
  • John Pescatore

Moving Legacy Software and FOSS to the Cloud, Securely

Research Paper

As more organizations consider the benefits of cloud adoption and use of legacy or freeand open...

  • 28 Dec 2015

An Introduction To Securing a Cloud Environment

Research Paper

While Cloud services offer flexibility, scalability and economies of scale, there have...

  • 27 Nov 2012

Cloud Computing - Maze in the Haze

Research Paper

When Amazon announced its EC2 environment in August 2006, one might not have imagined the change in...

  • 18 Oct 2011

Following Incidents into the Cloud

Research Paper

The increased level of complexity which cloud computing has introduced to incident handling is not...

  • 1 Mar 2011

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.