feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouUnited StatesUnited States
You
bookmarksYour BookmarkshashtagYour Topics
Trending
Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2026 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / Cloud Fears: Devs' Keys Stolen via Recruiter Scams

Cloud Fears: Devs' Keys Stolen via Recruiter Scams

6 Feb

•

Summary

  • Attackers use recruitment scams to steal cloud credentials.
  • New IAM pivot attacks bypass email security and scanners.
  • Compromised identities can gain cloud admin privileges in minutes.
Cloud Fears: Devs' Keys Stolen via Recruiter Scams

A new attack chain, dubbed the IAM pivot, is rapidly compromising cloud environments. Threat actors are leveraging recruitment fraud to deliver trojanized Python and npm packages, tricking developers into exfiltrating sensitive cloud credentials. These stolen tokens and API keys enable adversaries to gain full cloud IAM compromise within minutes, often bypassing standard email security and dependency scanners. CrowdStrike Intelligence research, published on January 29, 2026, details the industrial-scale operationalization of this tactic.

Recent incidents highlight the effectiveness of this method. In late 2025, a European FinTech company fell victim when attackers used malicious Python packages delivered through employment lures. The compromise pivoted directly to cloud IAM configurations, ultimately diverting cryptocurrency. This approach avoids traditional security gateways, leaving minimal digital evidence. CISA and JFrog have also tracked widespread npm supply chain compromises, with malicious code exfiltrating credentials during package installation.

The core of this vulnerability lies in weak or absent credentials and misconfigurations, which accounted for a significant portion of cloud incidents in early 2026. Attackers with valid credentials can log in without needing to exploit vulnerabilities. Research published in early February 2026 demonstrated compromised credentials achieving cloud administrator privileges in just eight minutes, traversing multiple IAM roles.

Identity Threat Detection and Response (ITDR) solutions are emerging as a crucial defense, monitoring identity behavior within cloud environments rather than solely relying on authentication success. These tools can detect anomalies in usage patterns, such as an identity suddenly enumerating all cloud resources or disabling logging. This behavioral analysis is critical, especially as AI gateways, while validating tokens, do not evaluate the consistency of an identity's behavior.

The attack chain progresses through three stages: Entry via trojanized packages bypassing email security, Pivot through stolen credentials enabling undetected IAM role assumption, and Objective targeting AI infrastructure. Each stage presents a control gap. The recommended actions include deploying runtime behavioral monitoring on developer workstations, implementing ITDR for cloud identity monitoring, and enforcing AI-specific access controls that correlate model access requests with behavioral profiles.

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
Attackers use recruitment scams to trick developers into installing malicious packages that exfiltrate cloud credentials like API keys and tokens.
The IAM pivot is a new attack chain where stolen developer credentials allow adversaries to gain full compromise of cloud Identity and Access Management configurations.
Research shows that with compromised credentials, attackers can achieve cloud administrator privileges and control IAM configurations within minutes.

Read more news on

Technologyside-arrow
trending

Islamabad suicide blast kills 31

trending

Ronaldo trains with Al Nassr

trending

India A vs Namibia live

trending

Vaibhav Suryavanshi scores 175

trending

VTU adopts Artificial Super Intelligence

trending

Riyan Parag scores fifty

trending

T20 World Cup opening ceremony

trending

Tiigers Kolkata reach ISPL final

trending

Al Ettifaq favored vs Damac

You may also like

AI Agents Blindfolded: The Data Gap

27 Jan • 33 reads

article image

AI Arms Race: Defense Meets Offense with $40M

14 Jan • 140 reads

article image

Your AI Coworker is Here: Meet the New Slackbot

14 Jan • 117 reads

article image

AI Memory Hacked: Chatbots Now Deceiving Users

1 Jan • 184 reads

article image

ServiceNow Buys Armis for $7.75B Cybersecurity Boost

23 Dec, 2025 • 236 reads

article image