The New Front Door for Cloud Attacks
For years, the story was simple. Attackers wanted your passwords. They phished for credentials, hunted for misconfigured access, and relied on human error to slip into cloud environments. That story has changed dramatically. According to Google Cloud’s latest threat intelligence, the playbook has been rewritten.
The data from the second half of 2025 reveals a startling pivot. Threat actors are now overwhelmingly choosing a different path of least resistance. Instead of trying to steal a key, they’re kicking down the door by exploiting known but unpatched software flaws. This isn’t a minor trend—it’s a fundamental shift in how cloud infrastructure is being targeted.
By the Numbers: A Dramatic Reversal
The statistics tell a clear story of evolution under pressure. In the first half of 2025, exploiting third-party software vulnerabilities was a minor tactic, accounting for just 2.9% of initial access incidents. By the second half of the year, that figure had skyrocketed to 44.5%. It became the dominant attack vector almost overnight.
Conversely, the abuse of weak or missing credentials—long the staple of cloud breaches—plummeted from 47.1% down to 27.2% over the same period. Attackers are rational. They follow the path of greatest reward for the least effort. Right now, that path leads straight through unpatched applications and permissive firewall rules that organizations have left open.
The Poster Child: React2Shell
One vulnerability exemplifies this new era: CVE-2025-55182, known as React2Shell. This critical flaw in React Server Components allows remote code execution. Think of it as a digital skeleton key for servers. Attackers linked to nation-state groups from North Korea and China were among those who weaponized it, but they weren’t alone.
What makes React2Shell particularly telling is the speed of its weaponization. Within a mere 48 hours of its public disclosure in December 2025, multiple criminal groups had already exploited it to install cryptocurrency mining malware on victim systems. It wasn’t a targeted espionage tool for weeks; it was a commodity exploit in days.
The Collapsing Window for Defense
This speed is the core of the new challenge. Google Cloud reports that the window between a vulnerability being disclosed and it being mass-exploited has collapsed “by an order of magnitude.” We’ve moved from having weeks to patch, to having just days. Sometimes, only hours.
If your organization’s patching cycle is measured in weeks or months, you are operating on borrowed time. Your cloud services are functionally vulnerable from the moment a critical flaw is announced until your patch is deployed. Attackers have automated their exploitation pipelines. Defense can no longer be a manual, slow-moving process.
Building a Modern Cloud Defense
So, what’s the answer? The strategy must evolve as quickly as the threat. Relying solely on manual patching is a recipe for failure. Google’s advice is to pivot toward automated, proactive defenses that can act at the speed of the attack.
One key recommendation is to use Web Application Firewalls (WAF) with automated rule updates. These can neutralize exploit attempts at the network edge, buying crucial time to deploy the actual software patch. It’s a stopgap, but a vital one. Centralized visibility tools are also non-negotiable. You can’t defend what you can’t see. Knowing exactly what’s running in your environment, and its patch status, is the first step to closing these digital doors.
Finally, don’t abandon identity controls. While they’re no longer the primary entry point, strong access management remains essential for limiting an attacker’s movement *after* they breach your perimeter. The goal is to build layers of defense that assume a breach will occur and work to contain it. The cloud threat landscape has shifted. Our defenses must do the same.