<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Offensive Engineering: Newsletter Issues]]></title><description><![CDATA[Offensive Engineering (an InfoSec Relations newsletter) delivers in-depth analysis on cybersecurity, big tech engineering, and the global threat landscape every week with insider perspectives from security practitioners, engineering leaders and policy experts.]]></description><link>https://offensive.infosecrelations.com/s/newsletter-issues</link><image><url>https://substackcdn.com/image/fetch/$s_!PLlt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd8bd9b-6699-4e30-8062-980e60019033_1068x1068.png</url><title>Offensive Engineering: Newsletter Issues</title><link>https://offensive.infosecrelations.com/s/newsletter-issues</link></image><generator>Substack</generator><lastBuildDate>Thu, 14 May 2026 01:05:16 GMT</lastBuildDate><atom:link href="https://offensive.infosecrelations.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[InfoSec Relations ]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[infosecrelations@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[infosecrelations@substack.com]]></itunes:email><itunes:name><![CDATA[S Eben J]]></itunes:name></itunes:owner><itunes:author><![CDATA[S Eben J]]></itunes:author><googleplay:owner><![CDATA[infosecrelations@substack.com]]></googleplay:owner><googleplay:email><![CDATA[infosecrelations@substack.com]]></googleplay:email><googleplay:author><![CDATA[S Eben J]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Offensive Engineering #2: Attacking the Cloud Control Plane ]]></title><description><![CDATA[Siri Varma Vegiraju on control plane compromise, identity misconfiguration, and the access paths security owners consistently overlook]]></description><link>https://offensive.infosecrelations.com/p/issue2-attacking-the-cloud-control-plane</link><guid isPermaLink="false">https://offensive.infosecrelations.com/p/issue2-attacking-the-cloud-control-plane</guid><dc:creator><![CDATA[S Pattnaik]]></dc:creator><pubDate>Wed, 13 May 2026 23:27:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!N3Yu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ff3217-758b-4441-913e-3df8568ee794_3600x1885.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Vercel recently disclosed that an attacker had breached through its internal systems using credentials that belonged to an employee but were no longer under that employee&#8217;s control. The breach did not start at Vercel, but at Context.ai, a third-party AI tool whose employee workstation was infected with Lumma Stealer malware in February, harvesting Google Workspace OAuth tokens that the attacker then used to pivot into Vercel&#8217;s environment. Customer project credentials stored as non-sensitive environment variables were enumerated before anyone inside either organization knew the chain of trust had broken. <a href="https://vercel.com/kb/bulletin/vercel-april-2026-security-incident">Vercel&#8217;s own security bulletin</a> describes the attacker as demonstrating a detailed understanding of its internal product API surface, as <a href="https://thehackernews.com/2026/04/vercel-breach-tied-to-context-ai-hack.html">The Hacker News</a> reported.</p><p style="text-align: justify;">What this incident brings to light is a breach path that runs entirely through valid credentials and legitimate API calls: no zero-days, no perimeter breach, just a trusted OAuth token presented to a system that had no way of knowing the human behind it had been compromised two months earlier. That path leads directly to the question that this issue examines - how attackers reach the cloud control plane not by attacking it directly, but by acquiring the secondary credentials that sit adjacent to it and carry enough access to make the distinction irrelevant.</p><p><a href="https://www.linkedin.com/in/sirivarma">Siri Varma Vegiraju</a>, Tech Lead at <a href="https://azure.microsoft.com/en-us/explore/security">Microsoft Azure Security</a>, walks through exactly this architecture in today&#8217;s feature. You can also watch the <a href="https://offensive.infosecrelations.com/p/live-sessions-1-attacking-the-control-plane-siri-verma">full live session on Attacking the Control Plane</a>.</p><div><hr></div><p><strong>THIS WEEK&#8217;S GEO-POLITICAL NARRATIVE</strong></p><p><strong>Operation Cloud Hopper Was Never About the Target</strong></p><p>Between 2014 and 2018, APT10 breached managed service providers across twelve countries rather than their actual targets &#8212; because MSPs held persistent administrative access to every client environment they served. One compromise meant access to all of them, through legitimate tools that left nothing anomalous to detect. The operational logic is identical to what makes the cloud control plane the primary objective today: the highest-value target is the trusted layer that&#8217;s between the attacker and everything they want to reach.</p><blockquote><p><strong>Narrative Link :</strong> <em><a href="https://infosecrelations.com/operation-cloud-hopper-msp-attack-apt10/">Operation Cloud Hopper Was Never About the Target</a> &#8212; InfoSec Relations</em></p></blockquote><div><hr></div><h1>The Insider View</h1><p>Featuring <a href="https://www.linkedin.com/in/sirivarma">Siri Varma Vegiraju</a>, Tech Lead at <a href="https://azure.microsoft.com/en-us/explore/security">Microsoft Azure Security</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://offensive.infosecrelations.com/p/live-sessions-1-attacking-the-control-plane-siri-verma" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!N3Yu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ff3217-758b-4441-913e-3df8568ee794_3600x1885.jpeg 424w, https://substackcdn.com/image/fetch/$s_!N3Yu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ff3217-758b-4441-913e-3df8568ee794_3600x1885.jpeg 848w, https://substackcdn.com/image/fetch/$s_!N3Yu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ff3217-758b-4441-913e-3df8568ee794_3600x1885.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!N3Yu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ff3217-758b-4441-913e-3df8568ee794_3600x1885.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!N3Yu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ff3217-758b-4441-913e-3df8568ee794_3600x1885.jpeg" width="1456" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/24ff3217-758b-4441-913e-3df8568ee794_3600x1885.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:762,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1985796,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://offensive.infosecrelations.com/p/live-sessions-1-attacking-the-control-plane-siri-verma&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://offensive.infosecrelations.com/i/197581663?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ff3217-758b-4441-913e-3df8568ee794_3600x1885.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!N3Yu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ff3217-758b-4441-913e-3df8568ee794_3600x1885.jpeg 424w, https://substackcdn.com/image/fetch/$s_!N3Yu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ff3217-758b-4441-913e-3df8568ee794_3600x1885.jpeg 848w, https://substackcdn.com/image/fetch/$s_!N3Yu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ff3217-758b-4441-913e-3df8568ee794_3600x1885.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!N3Yu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24ff3217-758b-4441-913e-3df8568ee794_3600x1885.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"></figcaption></figure></div><h2>Attacking the Cloud Control Plane</h2><p>The control plane is not where your data lives - it is instead the layer that governs who can reach it, enforcing identity policies, managing resource provisioning, and controlling privilege boundaries across every workload running beneath it, which means that compromising it does not give an attacker access to one system but administrative authority over the entire environment, using the cloud provider&#8217;s own tooling against every resource and identity it manages simultaneously.</p><p>That is what makes it the primary objective for any serious attacker, and understanding how they actually reach it - through the credential gaps, misconfigured identities, and forgotten API surfaces that most security teams are not actively governing , would actually be the practical starting point for anyone building or securing cloud systems today.</p><p><a href="https://www.linkedin.com/in/sirivarma">Siri Varma Vegiraju</a>, Tech Lead at <a href="https://azure.microsoft.com/en-us/explore/security">Microsoft Azure Security</a>, brings years of hands-on experience analyzing and securing cloud control plane environments. This conversation covers the architecture of a control plane compromise, the specific failure modes security teams miss, and why the rise of agentic AI is introducing a new category of identity risk that most cloud security models were not designed to handle.</p><h3>The Control Plane Is Where Risk Concentrates</h3><p>The strategic value of the control plane has grown proportionally as global workloads consolidated onto a small number of major cloud providers. When most of the world&#8217;s enterprise infrastructure runs on five or six platforms, a successful compromise on any one of them can cascade across every organization operating on that infrastructure.</p><p>Vegiraju explains that &#8220;from a cloud infrastructure standpoint, there are majorly five or six providers where most of the workloads are hosted, and that is what becomes the primary target for attackers because, if they are able to infiltrate one of them, they get huge access to all these company resources or whatever platforms are deployed on these resources&#8221;.</p><p>Vegiraju also points as to how attackers are now operationalizing the concentration risk, arguing that AI-assisted tooling has substantially lowered the cost and time required to scan a cloud environment, enumerate resources, and identify exploitable conditions. He goes on to explain that attacks have become cheaper with the rise of large language models and agentic AI, where spinning up an agent with expertise in carrying out a network or cybersecurity attack and pointing it at a set of resources to scan and enumerate is now well within the operational reach of most threat actors.</p><p>He identifies three structural shifts widening that exposure window simultaneously: identity architectures moving from flat to hierarchical as agentic systems replace individual user accounts, passwordless authentication replacing key-based systems and introducing new access control gaps in the process, and the rise of Model Context Protocol APIs enabling agents to interact with cloud resources without the operator fully understanding the underlying API surface - each of which creates entry points into the control plane that older security models were not designed to account for.</p><h3>Attackers Rarely Start at the Control Plane</h3><p>Most practitioners new to cloud security assume the control plane is where attackers begin, but in practice it is almost never the initial access vector - it is the objective that the entire breach path is working toward.</p><p>What attackers actually target first are secondary accounts and credentials with high privileges: developer tokens left in repositories, JWTs with long validation windows, service accounts granted broad access to solve a specific problem and never had their scope reviewed. These credentials are easier to find, easier to acquire, and sufficient to reach the control plane through a completely legitimate path.</p><p>&#8220;If you look at a typical breach path, these secondary targets are the ones that lead to the control plane,&#8221; Vegiraju explains. &#8220;You have a private or public key that is in a GitHub repo, or a JWT token with seven days of validation, or some developer accounts. These accounts have high privileges, and once you get access to them, you can query the control plane directly.&#8221;</p><p>What makes this breach path so effective is that control plane APIs are publicly available and designed to respond to valid tokens, which means an attacker with a legitimate credential does not need to break anything - they hand the token to the API and it does exactly what it was built to do, listing the resources, enumerating the infrastructure, and returning a complete map of everything that account can reach.</p><p>&#8220;Control plane APIs are publicly available,&#8221; Vegiraju notes. &#8220;You give that token to the control plane, and the control plane lists all the resources under that account. With that structure, you can do a targeted attack and reduce your targets to the specific storage buckets or resources you actually want.&#8221;</p><p>The path from a leaked developer credential to a full inventory of an organization&#8217;s cloud infrastructure is a single authenticated API call. This is the gap most organizations are not closing, because the focus stays on hardening the control plane perimeter while the actual breach path runs through credentials that predate the perimeter controls entirely.</p><h3>What a Real Attack Path Looks Like</h3><p>Walking through a concrete example is the clearest way to make the mechanics visible, and Vegiraju reaches back to an attack pattern from the early cloud era, around 2012 to 2013, whose underlying conditions show up in modern environments with different names but the same exploitable structure.</p><p>The attack centered on webhooks deployed on cloud instances. A webhook, for context, is a service that accepts an incoming HTTP request, performs a task, and sends a callback to a destination the caller specifies. Common in cloud architectures, and in themselves a completely normal operational tool.</p><p>The cloud instances running these webhooks had access to the Instance Identity and Metadata Service, or IDMS. This is a local endpoint available on every virtual machine in a cloud environment. Its purpose is to give services running on the VM a way to obtain authentication tokens for other cloud resources without storing credentials locally. The pattern works in a manner where a VM needs to read from a storage account, calls the IDMS endpoint, receives a token, and passes it to the storage service to authenticate without requiring to store credentials.</p><p>The IDMS endpoint was accessible via localhost with no authentication requirement, because the design assumption at the time was that anything running on the VM was already operating within a boundary that could be relied upon - which held true until an attacker found a way to make something outside that boundary call it anyway.</p><p>An attacker submitted a cURL request to the publicly exposed webhook. The webhook executed the cURL call against the local IDMS endpoint, retrieved a valid authentication token, and returned it to the attacker in the response. From there, the attacker called the storage bucket APIs with a token that carried broad access privileges, enumerated every bucket and object in scope, and exfiltrated data without triggering a single authentication failure because every action was legitimate from the API&#8217;s perspective.</p><p>&#8220;The control plane was indirectly involved, but it was not a direct attack on the control plane,&#8221; Vegiraju explains. &#8220;It was by getting the token and the combination of network security missteps plus broader access level that let the data be exfiltrated from storage buckets.&#8221;</p><p>Three conditions made this attack possible: an unauthenticated local endpoint, an overprivileged token, and no network controls restricting what the webhook could call outbound. None of those conditions is necessarily dangerous in isolation. Together, they created a complete breach path. This compound vulnerability pattern is what practitioners need to learn to look for, because fixing one condition while leaving the others in place does not remove the risk.</p><h3>Three Places Cloud Security Teams Leave the Door Open</h3><p>Vegiraju has identified three recurring gaps in how security teams approach control plane defense. Each is common enough to be structural rather than incidental.</p><h4>API proliferation without inventory</h4><p>Control plane APIs are not just CRUD endpoints. They include administrative APIs carrying elevated privileges, often created quickly to solve an operational problem and never formally tracked afterward.</p><p>&#8220;Sometimes these APIs have admin access,&#8221; Vegiraju explains. &#8220;In order to quickly solve a problem, a team creates an admin API with administrative privileges to what the control plane can do. When they expose it through the management API layer, only the CRUD operations are exposed. But unintentionally, the admin APIs sometimes get exposed as well.&#8221;</p><p>The deeper issue is the absence of a central inventory. &#8220;You end up spinning a bunch of these APIs and forget about them because there is no central place where you know what all APIs are available. Once you forget about them, these are publicly accessible but just not documented or listed to outside users.&#8221;</p><p>An undocumented API is still a reachable API. A human attacker working manually might miss an obscure endpoint. An agent scanning the full API surface methodically will not.</p><h4>Overprivileged identities</h4><p>Managed identities solve the credential rotation problem automatically, which is a real improvement over static keys. But rotation frequency does not determine access scope. The scope is still set by the operator, and it is consistently set too broadly.</p><p>&#8220;The access control still lies with me,&#8221; Vegiraju notes. &#8220;Each managed identity needs as restrictive permissions as possible. Basically, least privileges.&#8221;</p><p>An identity that can delete a storage bucket when it only needs read access to a single API endpoint is an identity an attacker can turn against its own environment without needing to escalate privileges at all. The damage potential is already built into the original configuration.</p><h4>Broken regional isolation</h4><p>Cloud providers organize resources into regions, and security teams often treat regional boundaries as access boundaries. They are not, unless explicitly configured to be.</p><p>&#8220;One API can access data from another region,&#8221; Vegiraju explains. &#8220;Region A has its own control plane, Region B has its own control plane, but a control plane in Region A can have permissions to access Region B, breaking the isolation factor. When a compromise happens, it becomes very hard to contain the attack and stop it.&#8221;</p><p>Regional isolation is a containment mechanism before it is a compliance concern. When a credential is compromised in one region, whether the attacker can pivot to another is entirely a function of how access scope was configured. Most organizations have not explicitly designed that boundary.</p><h3>Agentic AI and the New Identity Architecture</h3><p>Agentic AI systems introduce a structural challenge that flat cloud identity models were not built to handle. Understanding why requires a brief look at how cloud identity architecture has historically worked and where the new model diverges from it.</p><p>Traditional cloud identity is flat: a tenant contains accounts, each account carries a permission set, and security teams govern the scope of each permission set. The model works reasonably well when the number of identities is bounded and access patterns are predictable.</p><p>Agentic systems break both of those assumptions. An orchestrator agent directing multiple sub-agents creates a hierarchy of identities, each with its own access requirements and each representing a distinct failure point. If sub-agents share the orchestrator&#8217;s identity, a compromised sub-agent carries the full scope of the orchestrator&#8217;s permissions. The blast radius of a single compromised sub-agent becomes the blast radius of the entire system.</p><p>Vegiraju frames the principle through a practical example. &#8220;Let&#8217;s say I need to order food. The orchestrator agent knows how to do it: look at the menu, select the food, do the payment. Each of those tasks has its own sub-agent. The agent viewing the menu should not have permissions for any payment-related activity.&#8221;</p><p>The solution has two components. First, sandboxing at the AI layer establishes explicit API access lists for each agent, defining what it can reach and what it cannot. Second, each sub-agent gets its own managed identity scoped to its specific task. &#8220;Each sub-agent should get its own managed identity. You are able to control what the sub-agent can do because of what the managed identity has access to.&#8221;</p><p>Model Context Protocol APIs introduce a related complication. Agents interacting with cloud resources through MCP do not need to understand the underlying API surface. The MCP layer handles the translation. But that abstraction creates a risk: if the MCP API&#8217;s access is not explicitly scoped, an agent can reach resources it was never intended to interact with, and neither the operator nor the agent necessarily knows it is happening.</p><p>&#8220;If you are not controlling the access of this MCP API, it can lead to isolation problems where your API might result in access to resources it should not have access to,&#8221; Vegiraju explains.</p><p>The convenience and the risk are the same property. MCP makes agents powerful by abstracting away complexity. That same abstraction obscures the access boundaries that security depends on.</p><h3>When the Stakes Scale Up</h3><p>The security principles Vegiraju describes, network isolation, least privilege, and a complete API inventory, apply regardless of what the infrastructure supports. But the consequence of getting them wrong is not uniform across all deployments.</p><p>A compromised control plane governing a restaurant ordering platform is a recoverable incident. A compromised OAuth infrastructure governing emergency dispatch, 911 services, or financial systems operating at national scale is a different category of problem entirely.</p><p>&#8220;If the core infrastructure that governs your identities across emergency services, 911 services, fire services gets compromised, that is definitely a sovereignty problem,&#8221; Vegiraju says. &#8220;Either you are operating an emergency service or operating as simple as an inventory service. In any of the cases, the three security fundamentals stay.&#8221;</p><p>The fundamentals do not change with the stakes. What changes is the cost of every gap left unaddressed. The control plane does not know what it is governing. The teams designing and securing it do, and that is where the accountability sits.</p><div><hr></div><p><em><strong>You can also watch the full live session here.</strong></em></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;75997994-99e8-4f34-b74f-0581014f8641&quot;,&quot;caption&quot;:&quot;Cloud infrastructure has become the central battlefield for enterprise security, and the control plane is its most consequential layer. Attackers rarely go straight for it. They work through secondary accounts, leaked credentials, and overprivileged identities to reach it &#8212; and once they&#8217;re there, they can map, enumerate, and exfiltrate at scale. The ri&#8230;&quot;,&quot;cta&quot;:&quot;Watch now&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Live Sessions #1 Attacking the Control Plane with Siri Verma Veggiraju&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:493601667,&quot;name&quot;:&quot;S Pattnaik&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ec0551e7-b37d-403d-b313-708dd8d244af_144x144.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-05-13T22:57:59.027Z&quot;,&quot;cover_image&quot;:&quot;https://substack-video.s3.amazonaws.com/video_upload/post/197598020/97193bde-5a37-4861-8ce1-aa546dca3d1b/transcoded-1778712364.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://offensive.infosecrelations.com/p/live-sessions-1-attacking-the-control-plane-siri-verma&quot;,&quot;section_name&quot;:&quot;Live Sessions&quot;,&quot;video_upload_id&quot;:&quot;97193bde-5a37-4861-8ce1-aa546dca3d1b&quot;,&quot;id&quot;:197598020,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:8558701,&quot;publication_name&quot;:&quot;Offensive Engineering&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!PLlt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd8bd9b-6699-4e30-8062-980e60019033_1068x1068.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><p><strong>THIS WEEK&#8217;S PERSON OF INTEREST</strong></p><h3>Danny Brickman &#8212; Co-founder and CEO, Oasis Security</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!K10r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e70b31-4991-40ed-87d7-4a3322676082_686x386.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!K10r!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e70b31-4991-40ed-87d7-4a3322676082_686x386.jpeg 424w, https://substackcdn.com/image/fetch/$s_!K10r!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e70b31-4991-40ed-87d7-4a3322676082_686x386.jpeg 848w, https://substackcdn.com/image/fetch/$s_!K10r!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e70b31-4991-40ed-87d7-4a3322676082_686x386.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!K10r!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e70b31-4991-40ed-87d7-4a3322676082_686x386.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!K10r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e70b31-4991-40ed-87d7-4a3322676082_686x386.jpeg" width="716" height="402.8804664723032" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e0e70b31-4991-40ed-87d7-4a3322676082_686x386.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:386,&quot;width&quot;:686,&quot;resizeWidth&quot;:716,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Oasis Security CEO Danny Brickman, Live from Nasdaq MarketSite - YouTube&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Oasis Security CEO Danny Brickman, Live from Nasdaq MarketSite - YouTube" title="Oasis Security CEO Danny Brickman, Live from Nasdaq MarketSite - YouTube" srcset="https://substackcdn.com/image/fetch/$s_!K10r!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e70b31-4991-40ed-87d7-4a3322676082_686x386.jpeg 424w, https://substackcdn.com/image/fetch/$s_!K10r!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e70b31-4991-40ed-87d7-4a3322676082_686x386.jpeg 848w, https://substackcdn.com/image/fetch/$s_!K10r!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e70b31-4991-40ed-87d7-4a3322676082_686x386.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!K10r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0e70b31-4991-40ed-87d7-4a3322676082_686x386.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: IPO Edge</figcaption></figure></div><p><a href="https://www.linkedin.com/in/danny-brickman/">Danny Brickman</a> served in the Israeli Defense Forces in cyber research and development before co-founding <a href="https://www.oasis.security">Oasis Security</a> in 2022 to address a class of identity risk associated with non-human identities which the security industry had not yet treated as a primary concern. In March 2026, <a href="https://finance.yahoo.com/sectors/technology/articles/oasis-security-raises-120m-series-160000141.html">Oasis raised a $120 million Series B</a> led by Craft Ventures with participation from Sequoia Capital and Accel, following five times year-over-year ARR growth with a client base drawn predominantly from the Fortune 500.</p><p>The timing reflects a structural problem that has been building across enterprise environments. According to <a href="https://www.calcalistech.com/ctechnews/article/ske4mstcwl">data cited by Palo Alto Networks</a>, machine identities now outnumber human identities at a ratio of 82 to one, and that ratio grows with every new agent deployment, while the IAM systems governing them were designed for humans who log in, hold sessions, and get reviewed quarterly rather than for agents that act autonomously and continuously at machine speed.</p><p>At RSAC 2026, Brickman argued that the security model needs to shift from role-based to intent-based access control, because a static role assigned at deployment drifts from an agent&#8217;s actual behavior the moment its task changes, and the Vercel breach &#8212; where a developer authorized a third-party OAuth application with full read access and never reviewed it again &#8212; illustrates precisely what that governance gap costs in practice. (<a href="https://www.govinfosecurity.com/oasis-raises-120m-series-b-to-safeguard-agentic-identities-a-31301">GovInfoSecurity, March 30, 2026</a>)</p><div><hr></div><h2>SECURITY BRIEFS</h2><p>Cloud credential theft, supply chain poisoning, and identity abuse across five incidents from the past six weeks.</p><h4>UNC4899 Drains Crypto Wallets via Cloud SQL Manipulation</h4><p><em>North Korea&#8217;s UNC4899 (TraderTraitor/Slow Pisces) opened with a trojanized Python file AirDropped to a developer&#8217;s personal device, escalated through Kubernetes container escape and CI/CD token abuse to full cloud admin access, then rewrote Cloud SQL logic to reset MFA seeds and drain high-value wallets. Google GTIG documented the full kill chain in its H1 2026 Cloud Threat Horizons Report.</em></p><p><strong>Source: </strong><a href="https://cloud.google.com/security/report/resources/cloud-threat-horizons-report-h1-2026">cloud.google.com</a></p><h4>Lumma Stealer OAuth Chain Breaches  into Vercel</h4><p><em>A Lumma Stealer breach on a Context.ai workstation exfiltrated Google Workspace OAuth tokens, which threat actors used to pivot through a Vercel enterprise account and enumerate customer project environment variables. ShinyHunters claimed the data and listed it at $2M on BreachForums; Vercel and Google Mandiant are actively investigating<strong>.</strong> </em></p><p><strong>Source: </strong><a href="https://vercel.com/kb/bulletin/vercel-april-2026-security-incident">vercel.com</a></p><h4>TeamPCP Backdoors Trivy, KICS, and LiteLLM</h4><p><em>Between March 19 and 31, 2026, TeamPCP used stolen GitHub PATs to inject credential-harvesting scripts into Aqua&#8217;s Trivy, Checkmarx KICS, LiteLLM, and the Telnyx PyPI package, siphoning AWS, GCP, and Azure keys via IMDS and environment variables from downstream consumers. Wiz caught credential reuse across Azure, GitHub, and SaaS providers; Unit 42 published the full chain on April 9. </em></p><p><strong>Source:</strong> <a href="https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/">unit42.paloaltonetworks.com</a></p><h4><strong>UAT-10608 Hoovers 766 Hosts into NEXUS Listener</strong></h4><p><em>Cisco Talos caught UAT-10608 exploiting CVE-2025-55182 (React2Shell) across 766 Next.js hosts to systematically pull AWS keys, SSH private keys, Stripe tokens, GitHub credentials, and Kubernetes service account tokens into a self-built operator dashboard called NEXUS Listener. Every hit shared the same root condition- over-permissioned identities with no need-to-know boundary. </em></p><p><em><strong>Source: </strong><a href="https://hackaws.cloud/blog/aws-credential-harvesting-industrialized">hackaws.cloud</a></em></p><h4>React2Shell Unpatched Frontend Cracks LexisNexis AWS</h4><p><em>In late February 2026, FulcrumSec exploited an unpatched React frontend at LexisNexis via React2Shell to reach its AWS environment, exfiltrating and publicly leaking roughly 2GB of customer names, user IDs, business contacts, and support tickets. LexisNexis confirmed the data predates 2020 with no active PII, but the incident is a clean case study in how app-layer debt becomes cloud-layer breach.</em> </p><p><strong>Source:</strong> <a href="https://www.bleepingcomputer.com/news/security/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/">BleepingComputer</a></p><div><hr></div><p>Thank you for reading the second issue of Offensive Engineering on attacking the cloud control plane with Siri Varma Vegiraju. Part 2, covering the cloud data plane, is coming shortly.</p><p>Stay Curious, Stay Secure!</p><p><strong><a href="https://in.linkedin.com/in/samarpita-pattnaik">S Pattnaik</a></strong></p><p>Data Practitioner</p><p>Technical Contributor, Offensive Engineering &#8212; InfoSec Relations</p>]]></content:encoded></item></channel></rss>