🔑
Exposed Access Keys
GitHub credential leak
🎯
SSRF to IMDS
Metadata service attack
⚡
Lambda Escalation
Function exploitation
🔒
S3 Ransomware
Bucket encryption attack
📦
Supply Chain
Container compromise
🚪
IAM Backdoor
Persistent access
⛏️
Cryptomining
Resource hijacking
📤
Data Exfiltration
Database theft