Cloud SecurityJan Kahmen7 min read

Cloud Attacks 2026: What the IBM X-Force Report Means for Your Cloud Security

IBM X-Force 2026: 44% more attacks on cloud applications, 16M infected devices, identity as the primary risk. What organizations must do now.

The IBM X-Force Threat Intelligence Index 2026 paints an alarming picture: attacks on public-facing applications surged by 44 percent year-over-year. Vulnerability exploitation now accounts for 40 percent of all incidents observed by X-Force, dethroning phishing as the most common initial access vector for the first time. For organizations running cloud infrastructure, the situation is compounding — attack surfaces are expanding faster than most security teams can keep up.

This article contextualizes the key findings of the IBM report, supplements them with data from the Cloud Security Alliance (CSA) and the OWASP Cloud-Native Application Security Top 10 project, and derives actionable measures for defenders.

Identity Is the New Attack Surface

Perhaps the most critical finding of the X-Force report: the abuse of valid credentials (MITRE ATT&CK T1078) remains the top initial access vector in cloud environments. IBM observed over 16 million devices infected with infostealer malware such as Lumma, Acreed, and Vidar in 2025. The stolen credentials — browser passwords, session cookies, API tokens — end up on dark web marketplaces like Russian Market, where complete credential sets from individual victims sell for as little as 10 dollars.

Particularly concerning: over 300,000 ChatGPT credentials were advertised on the dark web in 2025, demonstrating that infostealer operators are systematically expanding their target lists to include cloud and AI services. Organizations reusing the same credentials across internal systems and external SaaS platforms effectively hand attackers broad ecosystem access after a single infostealer infection.

The CSA corroborates this trend with a striking metric: the ratio of machine-to-human identities in cloud environments has reached 100-to-1. Service principals, API keys, and automated agents vastly outnumber human users — and each non-human identity represents a potential attack vector. According to SentinelOne, compromised identities now account for over 70 percent of all cloud breaches.

Supply Chain Attacks Have Quadrupled

A second key finding: large-scale supply chain and third-party compromises have nearly quadrupled since 2020. Attackers increasingly target environments where software is built and deployed — CI/CD pipelines, package registries, and SaaS integrations.

IBM cites the NPM worm Shai-Hulud as a concrete example, which injected pre-infected, trojanized packages into the supply chain. For organizations developing cloud-native applications, this means every external dependency, every container image, and every Terraform configuration is a potential attack vector.

The CSA adds a new dimension: through the use of generative AI in software development — so-called "vibe coding" — organizations are increasingly producing "slop code": suboptimal components with hidden security flaws that developers integrate with minimal technical scrutiny. The risk is shifting from known dependency vulnerabilities to novel, AI-generated code that was never manually reviewed.

Misconfigurations Remain the Persistent Problem

Despite growing cloud security awareness, misconfigurations remain a systemic issue. According to current industry data, misconfigurations appear in nearly 38 percent of all identity-related breaches, and 95 percent of all cloud security failures stem from human error rather than platform vulnerabilities.

IBM identified multiple vulnerabilities in administrative platforms in the report, including cross-site scripting (CVE-2025-5347), privilege escalation (CVE-2025-8309), and access control flaws (CVE-2025-1724) in ManageEngine products. Salesforce and MuleSoft environments were also affected — platforms many organizations consider trusted and therefore test less rigorously.

The CSA describes a pattern they call the "Toxic Cloud Trilogy": the combination of a publicly accessible workload, a critical vulnerability, and elevated privileges. While the proportion of such toxic combinations declined from 38 percent (early 2024) to 29 percent (mid-2025), with hundreds of thousands of workloads per enterprise, a single instance is sufficient for a complete breach.

Lateral Movement Is Being Automated by AI

A particularly concerning development for 2026 is the emergence of AI-Induced Lateral Movement (AILM). Rather than using classic network pivots or stolen credentials for lateral movement, attackers exploit the organization's own AI infrastructure. Compromised AI agents with administrative privileges enable data exfiltration at machine speed — without triggering classical credential-based detection rules.

IBM recommends transitioning from static API keys to ephemeral, identity-based credentials with access windows measured in minutes or seconds. The principle of least privilege must be rigorously extended to non-human identities — including the growing number of autonomous AI agents operating within infrastructure.

Industry Distribution and Regional Trends

The IBM report also reveals that manufacturing accounts for 27.7 percent of all incidents, marking the fifth consecutive year as the most targeted industry. North America became the most-attacked region for the first time in six years at 29 percent (up from 24 percent in 2024). Active ransomware and extortion groups surged by 49 percent, while publicly disclosed victim counts rose roughly 12 percent.

For organizations in the DACH region, the same attack vectors apply regardless of geographic focus. The NIS2 directive, which took effect in Germany in December 2025, explicitly requires regular penetration testing and risk assessments — including for cloud infrastructures.

What Organizations Should Do Now

Five concrete measures can be derived from the X-Force report and CSA analysis:

  1. Enforce phishing-resistant MFA across all exposed platforms — especially cloud management consoles, SaaS applications, and AI services. Traditional SMS or app-based MFA is no longer sufficient against infostealer-based session hijacking attacks.

  2. Conduct API token audits and restrict OAuth consent — IBM explicitly recommends high-scope audits for API tokens. Reused OAuth tokens should be revoked, and third-party OAuth consent restricted to a minimum.

  3. Perform cloud pentests focused on IAM and lateral movement — standard vulnerability scans are not enough. A professional cloud penetration test must cover IAM privilege escalation, cross-account movement, and service trust relationship exploitation. Platform-specific testing for AWS, Azure, and GCP is essential.

  4. Integrate supply chain security into the CI/CD pipeline — treat all external dependencies, container images, and AI-generated code as untrusted third-party components. Static code analysis should be a mandatory part of every build process.

  5. Establish dark web monitoring for stolen credentials — IBM recommends heightened vigilance particularly during January and June, as infostealer campaigns show seasonal increases during these periods. A Darknet Intelligence Assessment can identify compromised credentials early.

Conclusion

The IBM X-Force Report 2026 confirms a fundamental shift: cloud attacks no longer primarily target technical infrastructure vulnerabilities but instead focus on identities, credentials, and trust relationships between services. With 16 million infostealer-infected devices, a quadrupling of supply chain attacks, and the emergence of AI-driven lateral movement techniques, reactive measures are no longer sufficient. Organizations that fail to regularly test their cloud environments through professional penetration testing are exposing themselves to exactly the attacks described in this report — and the average breach cost of 4.44 million dollars per incident.

Our Services