Skip to content
Threat Feed
medium advisory

CrowdStrike CNAPP Enhanced with Adversary-Informed Risk Prioritization

CrowdStrike enhances its CNAPP capabilities by incorporating adversary intelligence for improved risk prioritization, addressing limitations in infrastructure visibility, threat actor behavior analysis, and alert triage.

CrowdStrike has enhanced its Cloud Native Application Protection Platform (CNAPP) to provide adversary-informed risk prioritization. Current CNAPP solutions often fall short by focusing solely on infrastructure, ignoring specific adversary behaviors, and generating excessive alerts. This update to CrowdStrike Falcon Cloud Security addresses these gaps by providing visibility into business applications, correlating risks with known adversary tactics (such as those used by LABYRINTH CHOLLIMA and SCATTERED SPIDER), and providing real-time detection of configuration changes that introduce risk. The goal is to enable security teams to prioritize remediation efforts based on real-world threat actor behavior and focus on the most critical exposures. This proactive security approach allows organizations to anticipate and mitigate cloud breaches more effectively, rather than chasing theoretical risks.

Attack Chain

  1. Initial Access: An attacker gains initial access to a cloud environment, potentially through compromised credentials or exploiting a misconfiguration.
  2. Privilege Escalation: The attacker attempts to escalate privileges within the cloud environment, leveraging weaknesses in Identity and Access Management (IAM) policies or exploiting vulnerable services.
  3. Lateral Movement: Once elevated, the attacker moves laterally across the cloud infrastructure, identifying and accessing sensitive data stores or critical applications.
  4. Application Exploitation: The attacker exploits vulnerabilities in business applications running in the cloud environment, such as SQL injection flaws or remote code execution vulnerabilities.
  5. Data Exfiltration: The attacker exfiltrates sensitive data from compromised applications and data stores, potentially using cloud storage services or establishing covert communication channels.
  6. Persistence: The attacker establishes persistence within the cloud environment, ensuring continued access even if initial entry points are discovered and patched.
  7. Impact: The attacker achieves their objective, such as data theft, financial gain, or disruption of critical services.

Impact

Successful exploitation of cloud vulnerabilities can lead to significant data breaches, financial losses, and reputational damage. In 2025, cloud intrusions by state-nexus actors increased by 266% year-over-year, underscoring the growing threat to cloud environments. The sectors most at risk include financial services, healthcare, and critical infrastructure. A successful attack can result in the theft of sensitive customer data, intellectual property, or trade secrets, leading to regulatory fines, legal liabilities, and loss of competitive advantage.

Recommendation

  • Implement the Sigma rule “Detect Cloud Account with Excessive Permissions” to identify overly permissive access controls within cloud environments, a common initial access and privilege escalation vector (logsource: cloudtrail, rule: Detect Cloud Account with Excessive Permissions).
  • Utilize the “Adversary Intelligence for Cloud Risks” capability in CrowdStrike Falcon Cloud Security to prioritize remediation efforts based on known adversary tactics, techniques, and procedures (TTPs), focusing on threat actors such as LABYRINTH CHOLLIMA and SCATTERED SPIDER.
  • Deploy the Sigma rule “Detect Data Exfiltration via Cloud Storage” to identify unauthorized data transfers to cloud storage services, a common tactic used by attackers to exfiltrate sensitive information (logsource: cloudtrail, rule: Detect Data Exfiltration via Cloud Storage).
  • Continuously monitor cloud configurations and audit logs for suspicious activity, such as unauthorized access attempts, privilege escalations, and lateral movement.

Detection coverage 2

Detect Cloud Account with Excessive Permissions

high

Detects a cloud account with overly permissive IAM policies, potentially allowing for privilege escalation and lateral movement.

sigma tactics: privilege_escalation techniques: T1555 sources: cloudtrail, aws

Detect Data Exfiltration via Cloud Storage

medium

Detects data exfiltration attempts by monitoring for large or unusual data transfers to cloud storage services.

sigma tactics: exfiltration techniques: T1041 sources: cloudtrail, aws

Detection queries are kept inside the platform. Get full rules →