Amazon Web Services Faced Nearly 1/5th of Cloud Native Exploits in 2022

Cloud based storage has enabled greater efficiency for websites as well as more secure database creation for corporate and business entities, but they have also given rise to a new kind of cyber security threat. Malicious actors are creating cloud native exploits to try and target these new data storage methods, and according to a report, Amazon Web Services are the most popular target with all things having been considered and taken into account.

Based on the findings released in this report, around 53 cloud based exploits have been detected in 2022 so far. With all of that having been said and now out of the way, it is important to note that ten of these exploits focused on Amazon Web Services. That represents 18.9% of all cloud exploits, making AWS the most common target for such malicious actors by a large margin.


In spite of the fact that this is the case, five other companies each represent 9.43% of the remaining total of vulnerabilities that are being exploited by cybercriminals. These five companies are Discord, Microsoft OneDrive, Google Drive, Dropbox and GitHub.

Following these five is Pastebin, making it the third most popular target for such exploits. It represented a total of 5.66% of all exploits. Also, while OneDrive represents half the total exploits that AWS does, other Microsoft products such as 365 Suite and Azure face one or two exploits each as well. Google Docs, Firebase and Forms also have some exploits, so the majority of cloud exploits are the responsibility of three of the Big Five tech companies namely Amazon, Microsoft and Google.

The combined total of cloud exploits in Microsoft’s services represent the same proportion as AWS, specifically 18.9%. That makes both Microsoft and Amazon the worst performers in this metric, with Google following close behind with 15.1%.

Major tech companies need to take steps to protect their cloud based storage platforms. Curiously absent from this list is iCloud, so Apple might have some advice to give its competitors about how cloud storage can be made more secure.

Read next: How Five Countries Have Been Spying on You for Decades
Previous Post Next Post