Learning Library

← Back to Library

Cloud Threat Landscape: XSS Dominates

Key Points

  • The cloud computing market is projected to reach $600 billion in 2024, driving massive migration of on‑premises data to the cloud and thereby expanding the overall attack surface.
  • IBM X‑Force’s annual cloud‑threat landscape report draws on four main data sources: global threat‑intelligence feeds, penetration‑testing findings, incident‑response engagements, and monitoring of dark‑web activity.
  • Cross‑site scripting (XSS) remains the leading newly discovered vulnerability, accounting for 27 % of reported CVEs, despite being a decades‑old issue.
  • XSS attacks allow malicious code injected into web pages (e.g., via comment links) to hijack user sessions, redirect victims to malicious sites, alter page content, or deliver malware, underscoring the need for continued remediation and secure coding practices.

Full Transcript

# Cloud Threat Landscape: XSS Dominates **Source:** [https://www.youtube.com/watch?v=VK0GyUSDwQY](https://www.youtube.com/watch?v=VK0GyUSDwQY) **Duration:** 00:11:21 ## Summary - The cloud computing market is projected to reach $600 billion in 2024, driving massive migration of on‑premises data to the cloud and thereby expanding the overall attack surface. - IBM X‑Force’s annual cloud‑threat landscape report draws on four main data sources: global threat‑intelligence feeds, penetration‑testing findings, incident‑response engagements, and monitoring of dark‑web activity. - Cross‑site scripting (XSS) remains the leading newly discovered vulnerability, accounting for 27 % of reported CVEs, despite being a decades‑old issue. - XSS attacks allow malicious code injected into web pages (e.g., via comment links) to hijack user sessions, redirect victims to malicious sites, alter page content, or deliver malware, underscoring the need for continued remediation and secure coding practices. ## Sections - [00:00:00](https://www.youtube.com/watch?v=VK0GyUSDwQY&t=0s) **IBM X-Force Cloud Threat Analysis** - The segment outlines how IBM’s X‑Force team evaluates the expanding cloud attack surface—using threat intelligence, penetration testing, incident response data, and dark‑web monitoring—to produce its fifth‑annual cloud security report. ## Full Transcript
0:00the cloud computing industry is expected 0:02to hit $600 0:05billion in 2024 that's a lot and what 0:09that means is a lot of your data that 0:11currently is inhouse or on Prim is going 0:13to be moving to the cloud and what that 0:16means is an expanded attack surface so 0:19that's why we're taking a look 0:21specifically IBM's exforce research 0:23group at what is the cloud threat 0:25landscape what are some of the things 0:27that we're using to determine that well 0:30this is our fifth year of doing this 0:32report so we've got a lot of experience 0:33with this and some of the areas that 0:35we're using to draw our conclusions are 0:38threat intelligence reports we have a 0:41lot of access to information about 0:42what's going on on the global internet 0:45and we use that information in this 0:47report some other things uh IBM's 0:49exforce team is called in to do 0:52penetration tests so we learn things 0:54from those penetration tests where are 0:56particular weaknesses we also do 0:58incident response planning and the 1:02emergency response services that go 1:03along with that when the companies call 1:05up and say hey our hair is on fire 1:07where's the fire extinguisher so we try 1:09to help figure out those kinds of things 1:11and those incidents also inform this and 1:13then also we look at a thing called the 1:15dark web uh which is uh essentially a 1:19part of the web that most people never 1:20see and it's an area where a lot of 1:23hackers hang out and they discuss things 1:26and we like to sit in and listen on what 1:28they're discussing 1:30okay let's take a look at what some of 1:31the key takeaways and recommendations 1:33were from that report well number one on 1:36the list is actually not a new one it's 1:39been around for a good long time but it 1:41came in at 27% of the newly discovered 1:45Co common vulnerabilities and exposures 1:48and it's something called cross-site 1:50scripting cross-site scripting like I 1:52said is not new it's been around for a 1:54couple of decades but it's still hurting 1:57us how does that work well here's the 2:00version if you've got a website and a 2:02bad guy is able to insert let's say in 2:05the comments section he's able to put in 2:07a link and that link contains some 2:10additional code maybe some JavaScript 2:12that's the in insertion that's happening 2:15here uh and he's putting that in to the 2:19website another guy comes along and 2:22reads that and clicks on the link once 2:24he clicks on the link now this content 2:27is running on him uh it wasn't cont 2:29content supplied by the website it was 2:32content supplied by the bad guy and what 2:34can that do well a number of bad things 2:36for instance one of the things it can do 2:38is hijack his session by allowing the 2:41bad guy to take his session tokens and 2:43then control the session from that point 2:46forward another thing that can happen is 2:48he can be redirected off to some other 2:50sketchy website and not realize that in 2:53fact he's even left this one uh it could 2:55do a lot of other things like making uh 2:58this site even look different to him 3:00than what it should be it could implant 3:02malware on his system a lot of different 3:04things that could happen really bad 3:06stuff and we're seeing this continue 3:08there are a lot of things that we can do 3:10and I'll talk about at the end of the 3:11video that will help prevent that all 3:14right our number two takeaway from the 3:15report also was the second most 3:19impactful in terms of it being seen in 3:22terms of vulnerabilities and that is 3:25stolen credentials compromised 3:27credentials basically think passwords 3:30and it turns out this was 20% of the 3:33incidents that we found so that's a lot 3:35and what we saw in particular that was 3:38concerning in this trend is when our 3:40exforce researchers looked on the dark 3:42web which is sort of considered a 3:44marketplace where a lot of bad guys are 3:46hanging out and they are buying and 3:49selling credentials and and all sorts of 3:51things like that and we observed that 3:54the cost of credentials average cost of 3:56these went down 133% 4:00in the last two years well that means if 4:03it's cheaper to buy passwords then it's 4:06going to be easier for the bad guys to 4:08buy more of them it's going to be easier 4:09for them to log in than it is to hack in 4:12and that is in fact what we've seen now 4:15another way to look at this is as cost 4:18of those credentials goes down if we 4:20move over here to this side then the 4:22threat level in fact is going up so 4:25that's what we've seen so far what we 4:28want to see though is a turn in this 4:31maybe I can't go make the cost of these 4:33credentials more expensive but what I 4:35could do is do the opposite make them 4:37worthless drive them to zero then in 4:41fact I could make the threat go down if 4:44these were in fact worthless how could I 4:46do that well one way that I could drive 4:48it in that direction is multiactor 4:51authentication that means a password 4:53alone will not get you into this system 4:55so therefore having a password is not 4:57really as valuable as it used to be so 5:00that's going to cause the value of 5:02passwords to go down another thing that 5:04would really help here is the use of 5:06pass keys and I've got a video two 5:09videos where I talk about these these 5:11pass keys they basically eliminate 5:14passwords and therefore make their value 5:17absolutely zero so people that want to 5:20buy and sell these things would be 5:22selling useless Commodities that is a 5:25potential way for us to go to counteract 5:27this particular threat so let's dissect 5:30that last one that I just talked about I 5:32said it's stolen credentials that are 5:34creating a lot of problems for us how 5:36are people actually stealing those 5:38credentials what are the main ways that 5:40they're doing it well it turns out there 5:42are two main classes of attacks that are 5:45accounting for a large number of these 5:47fishing and business email compromise 5:49let's talk a little about what those are 5:51in fact fishing accounted for 33% of the 5:54incidents where we were dealing with 5:56this and business email compromise 39% % 6:00now hopefully you're familiar with this 6:02you may not be as familiar with this so 6:03let's talk a little bit about what the 6:05differences in these are in a fishing 6:07attack generally speaking we're trying 6:10to Target a whole lot of people so it's 6:13not just a single person although there 6:16are spear fishing attacks where we try 6:18to Target a narrow subset of people but 6:21it's still usually not just from going 6:23after one person however in the case of 6:26business email compromise these tend to 6:28be going after just one person and in 6:30most cases it's someone in the SE Suite 6:33someone who's like a CEO a CIO uh a CFO 6:37someone who's really in a position where 6:39if I were able to get their account I'd 6:41be able to do a lot of damage and it's a 6:44case where I send them an email it's 6:46very highly tailored to their specific 6:48information so it becomes very very 6:51believable so that's one of the big 6:53differences between these two um in in 6:56both of these there's an element of 6:58deception obviously this is uh in with 7:01fishing we're dealing with fake 7:03typically fake websites where I send you 7:06a link and then you're going to go to a 7:08site that looks like what the real one 7:10is but isn't and then I'm going to 7:12collect your credentials when you try to 7:13log in that's one way to do it or I send 7:16you an attachment of some sort and then 7:19you open the attachment maybe it puts 7:21malware on your system and then from 7:23that the next time you go to log in with 7:25a keystroke logger I'm able to get your 7:27your information that called an info 7:29Steel so I can get whatever it is you 7:31type in in these situations I'm dealing 7:34more with 7:36impersonation impersonation attacks now 7:39are going to do something where I'm 7:41going to say let's say I am the CFO and 7:44I'm sending an email to the CEO so the 7:47Chief Financial Officer sending an email 7:49to the CEO or one of the first 7:52lieutenants one of the people that works 7:54for the CEO and I'm saying hey this is 7:56me your employee trusted here I I need 7:59the follow in information I need you to 8:00log in and approve this particular thing 8:03something along those lines so it's a 8:05very specific targeted impersonation 8:08attack in both of these cases there's an 8:10element of social engineering so that's 8:13what we have to look at this is how the 8:15bad guys are getting in now you've seen 8:17what the problems are what can we do 8:20about it what are the recommendations 8:22well the first relates to cross-site 8:24scripting and the first couple of things 8:26I'm going to refer to are really for 8:28website Developers 8:29and that is looking at something that 8:32nobody likes to do and it's the hard 8:34work of validating all the 8:37inputs that is I've got to look at 8:40everything that comes into an input 8:41field and make sure that it doesn't for 8:43instance include a script because that's 8:46where people should be say typing in 8:48comments typing in their name their 8:50email address I don't expect executable 8:53code there but if I don't check 8:54explicitly for it then someone could put 8:57that in and then someone else comes 8:59along later later and it does damage 9:01another thing I want to do is encode 9:04outputs and this one is more for web 9:07developers to understand what the HTML 9:09encodings are for special characters I'm 9:11going to go over these things in more 9:13detail in another video on cross-site 9:16scripting so look for that but these are 9:18things that developers can do and 9:21another thing end users should be 9:23careful about is when you see links on 9:26websites especially if the links are in 9:29comment sections or in areas where other 9:31people might be able to put things in 9:33don't just click on those links that 9:35could be a bad deal that could be a an 9:38injection attack where someone has 9:40injected scripting code that is going to 9:42take over your system or do other s 9:44sorts of things that you don't want to 9:46have happen so be careful on that sort 9:48of thing the other one deals with 9:50credentials as I mentioned the other big 9:52takeaway was about stolen credentials 9:55and I talked a little bit about what 9:57some of the things that that we can do 9:58about this 9:59it's the usual it's multiactor 10:02authentication which causes us to not 10:05depend so much on passwords which are 10:07things that are not very secure to begin 10:09with because users choose bad ones and 10:11they can in fact be shared bought and 10:13stolen uh and and things like that pass 10:17Keys as I've mentioned are a good option 10:19here as well those cannot easily be 10:22bought and sold and things like that 10:24they're going to stay on the device 10:26they're cryptographically strong so 10:28that's going to cause us to not be using 10:31the same kind of credentials that we've 10:32used in the in the past and they are by 10:35the way they are designed generally 10:37fishing resistant which is another bonus 10:39for that and then we need to do a lot 10:41better job of training end users there 10:45we our job never stops here it's not 10:48just a once a year here's your one hour 10:50of security training we need to keep 10:51reinforcing these messages so that it 10:54becomes part of the DNA for every user 10:56in the system they don't have to 10:58understand the details of what these 10:59things are but they need to understand 11:01we don't do this kind of stuff and we 11:04take advantage of these things when we 11:06have them so that if you want to see 11:09more and there's a lot more detail in 11:10this report please go take a look at the 11:13report download that and learn what you 11:16can to protect yourself as you move into 11:18the cloud environment