Microsoft Azure is being impacted by a "by-design" vulnerability, which could be exploited to compromise Microsoft Storage accounts and proceed with lateral movement and remote code execution attacks, according to The Hacker News.
Orca researchers noted that such an exploitation path is facilitated by Shared Key authorization, which is being used by storage account access keys to authorize data access. Access tokens could be stolen through Azure Functions manipulation, which would later allow attackers with Storage Account Contributor account access to facilitate privilege escalation and system hijacking, the Orca report found.
"By overriding function files in storage accounts, an attacker can steal and exfiltrate a higher-privileged identity and use it to move laterally, exploit and compromise victims' most valuable crown jewels," said Orca researcher Roi Nisimi.
Organizations have been urged to leverage Azure Active Directory authentication in place of Azure Shared Key authorization to mitigate risks. Further updates on the functionality of Functions client tools on storage accounts are also being examined by Microsoft.
Sysdig has unveiled a new cloud-native application protection platform featuring end-to-end cloud detection and response, which it touts to be the first of its kind, reports SecurityWeek.
Data in Honda's power equipment e-commerce site exposed by API vulnerabilities BleepingComputer reports that Honda had its e-commerce platform for power equipment impacted by password reset API security vulnerabilities, which could be leveraged to access customer information and other documents.
Google Cloud announced June 8 that cryptomining-attack prevention is built into its risk-management solution the cloud service provider is offering customers of its Security Command Center Premium service.