
“Cloud Privilege Abuse Emerges as a Critical Security Vulnerability”
SANS Institute Announces TOP 5 New Cyber Attack Techniques Threatening Enterprises
In cloud and SaaS environments, the 'privilege abuse' phenomenon, where user privileges are duplicated or excessively granted, has become a critical security vulnerability. As the adoption of AI accelerates, attackers exploit the complexity of AI regulatory environments to threaten organizations.
The global cybersecurity training institution, SANS Institute, revealed ‘The 5 Emerging Cyber Attack Techniques Poised to Disrupt Enterprises in 2025’ at RSAC2025, the world's largest security event held in San Francisco, USA. SANS Institute announces attack techniques annually.
This year's announcement encompassed a diverse range of fields from privilege abuse in cloud environments to disruptive attacks targeting Industrial Control Systems (ICS), and AI regulatory risks.

1. Authorization Sprawl in Cloud and SaaS Environments
Joshua Wright, a SANS fellow, warned that the 'abuse of privileges', where user permissions overlap or are excessively granted in cloud and SaaS environments, is emerging as a serious security vulnerability.
Many companies are using cloud services these days. However, the more they use the cloud, the more difficult it becomes to manage 'who has access to what'.
The main issue arises when an employee has too many permissions across different systems. In such cases, a hacker could exploit these privileges without being noticed.
Additionally, with company cloud resources scattered across various locations, it becomes challenging to accurately track who is accessing what. This makes it difficult to detect attacks quickly and respond promptly.
SANS suggests that to solve these issues, companies should enhance security at the web browser level and develop systems that allow an overview of multiple cloud sites. Furthermore, they should cultivate the habit of diligently recording who did what. This way, in the event of an incident, it is possible to trace how and why it happened, enabling a swift response.
2. Ransomware Targeting Industrial Control Systems (ICS Ransomware)
Tim Conway, Technical Director of SANS's ICS and SCADA programs, revealed that ransomware attackers are increasingly targeting critical infrastructure. Typically, ransomware attackers are cybercriminal groups aiming for monetary gains. Instances of them taking ICS operational shutdowns with substantial societal impacts as hostages are on the rise.
Recently, hackers have been targeting crucial facilities like electricity, water, and transportation. These facilities are in the midst of transitioning manual operations to automated systems.
However, during this transition, there are instances where the manual recovery methods are eliminated when physical problems arise. If the system stops, there's no way to restart it, causing a complete shutdown.
Hackers exploit these vulnerabilities, potentially paralyzing entire facilities.
The bigger issue is the lack of communication between the IT team and the OT team (site facility managers). If a hacking incident occurs and they fail to collaborate, quick containment becomes impossible, exacerbating the damage.
Companies with industrial facilities, such as factories or power plants, must develop security and recovery plans together, creating a system where the IT team and OT team can work in collaboration. A strategy involving the entire company is needed to counter ransomware attacks effectively.
3. Destructive Industrial Control System Attacks (ICS)
Both cybercriminal groups and state-sponsored attackers are increasingly focusing on destructive attacks that cause physical damage. They target systems (ICS) that control real-world facilities like power plants, water treatment plants, and railway systems to directly harm people.
They manipulate safety systems by finding very small, technical gaps that are hard to detect. For instance, they may damage temperature control devices or disable automatic shutdown functions. This can lead to major incidents such as explosions or fires.
The recent large-scale blackouts in Spain and Portugal vividly illustrate the risks of such ICS cyber attacks.
On April 28, 2025, a large-scale blackout across Spain and Portugal began with about 60% of power supply disappearing within five seconds. This paralyzed major infrastructure like hospitals, airports, and railways, plunging the nation into chaos.
Although the cause of this incident is still under investigation, it clearly showed that cyber attacks targeting ICS can lead to such chaos.
As these threats are continually evolving, traditional malware defenses are no longer sufficient. We now need to prepare for kinetic threats, those that can impact real-world operations.
We need to establish monitoring systems that provide better insights into control systems and reassess whether the current safety regulations are effectively functioning. Emergency response plans, including management, must be developed. Strategies are required to protect lives and social safety, extending beyond just IT and data security.
4. Erasing Forensic Evidence
Nowadays, attackers either deliberately leave no traces (digital records) or erase them.
These traces are essential for understanding what happened after an incident. However, without traces, it becomes difficult for security teams to figure out how the hacker got in or how much information was stolen. This can delay responses and increase damage.
However, many companies still use outdated detection systems and cannot adequately respond to these new hacks.
Companies should configure systems to properly record important information and adopt the latest digital forensic tools (DFIR) to establish a basis for detailed investigation. Training team members to investigate even in trace-scarce situations is also necessary.
By preparing in this way, companies can quickly identify and prevent the causes even if a hack occurs.
5. AI Regulatory Compliance Threats
As AI is increasingly used in cybersecurity, new risks are also emerging. The issue at hand is adherence to the law.
Security teams can use AI to detect hacking or threats more quickly and accurately. However, in some countries, regulations are being developed that question how AI is used to monitor people. If such regulations are enacted, AI-based surveillance methods could become illegal.
This situation could be advantageous for hackers, while disadvantageous for security teams. Hackers can use AI freely, but security teams may find their hands tied by the law.
Companies need to prepare in advance for ways to use AI safely while complying with the law. This way, they can maintain security and avoid legal issues.
Essential Strategic Tasks for Business Leaders
Looking at the cyber attack techniques presented by SANS at RSAC 2025, one common message emerges. Now, cyber security is not just the concern of the security department; it is an issue that the entire company must take responsibility for together.
The upcoming cyber threats are smarter and more complex, and can only be prevented if all departments collaborate and respond quickly. It is a critical time for a comprehensive strategy that involves being well-informed (visibility), moving quickly (agility), and communicating and working together (collaboration) across departments.
Popular Articles