Attackers are abusing the characteristics of cloud services to launch and hide their activity as they traverse target networks.
A new body of evidence indicates threat actors are using increasingly advanced techniques to target cloud providers and leveraging cloud-specific traits to hide their activity as they breach and persist in target networks.
ORIGINAL SOURCE: Dark Reading