GitHub, NPM, Google and AWS: 83% of Cloud Breaches Start with Identity. AI Agents are About to Make it Worse.

GitHub, NPM, Google and AWS: 83% of Cloud Breaches Start with Identity. AI Agents are About to Make it Worse.

Google’s Cloud Threat Horizons Report Reveals Accelerating Cyber Threats and Flawed Defenses

Google’s H1 2026 Cloud Threat Horizons Report, compiled by the Google Threat Intelligence Group, Mandiant Incident Response, and the Office of the CISO, highlights a rapidly evolving threat landscape that outpaces traditional security measures. The report identifies three critical vulnerabilities in enterprise defenses: unchecked identity sprawl, weaponized AI tools, and collapsing exploitation windows all demanding a fundamental shift in security architecture.

Identity Failures: The Unresolved Crisis Expands

For years, stolen credentials and phishing have dominated breach vectors, yet organizations continue to overprovision access prioritizing operational convenience over security. Google’s data reveals that 83% of cloud intrusions in H2 2025 stemmed from identity compromise, but the real concern lies in where these failures occur. Two incidents illustrate the shift:

  • UNC4899 (North Korean actors) exploited unconstrained CI/CD service accounts in Kubernetes, bypassing human oversight entirely.
  • UNC6426 leveraged a compromised GitHub token to escalate to full AWS admin access within 72 hours, demonstrating how non-human identities service accounts, OIDC roles, and long-lived tokens now drive attacks.

The proliferation of AI agents, which authenticate autonomously and traverse environments at machine speed, risks repeating these mistakes at an unprecedented scale.

AI as an Attacker’s Reconnaissance Tool

The QUIETVAULT credential stealer, embedded in a malicious NPM package, didn’t just exfiltrate tokens it hijacked the victim’s local LLM to scan for sensitive files (.env, .conf, .log) before extracting credentials. The attacker didn’t need to deploy new malware; the developer’s trusted AI-assisted environment became an automated reconnaissance engine, invisible to traditional endpoint detection. Most organizations lack visibility into LLM process execution, let alone policies to detect anomalous activity.

Exploitation Windows Collapse to Days

In H2 2025, threat actors deployed cryptocurrency miners within 48 hours of a critical CVE’s disclosure. Software-based initial access vectors surged from 2.9% to 44.5% of incidents in six months, shrinking the window between vulnerability disclosure and mass exploitation from weeks to days. Manual patching, access reviews, and incident triage are now obsolete Google’s automated forensic pipeline reduced cloud compromise investigations from days to under 60 minutes, proving that human-speed responses are no longer viable.

The Case for AI-Native Security

The report argues that bolting AI onto legacy security tools is insufficient. Instead, enterprises need AI-native security architectures designed for:

  • Identity governance that accounts for autonomous AI agents, not just human users.
  • Threat detection that treats LLM activity as a primary signal.
  • Automated response pipelines where human judgment intervenes only for critical decisions, not as a bottleneck.

Adversaries already operate at machine speed, exploiting ungoverned identities and weaponizing AI. Organizations delaying this shift are making a present-tense risk decision one the data shows is already being exploited.

Source: https://securityboulevard.com/2026/03/83-of-cloud-breaches-start-with-identity-ai-agents-are-about-to-make-it-worse/

Google Cloud Security cybersecurity rating report: https://www.rankiteo.com/company/googlecloudsecurity

Amazon Web Services (AWS) cybersecurity rating report: https://www.rankiteo.com/company/amazon-web-services

NPM cybersecurity rating report: https://www.rankiteo.com/company/npm

GitHub cybersecurity rating report: https://www.rankiteo.com/company/github

"id": "GOOAMANPMGIT1773319158",
"linkid": "googlecloudsecurity, amazon-web-services, npm, github",
"type": "Cyber Attack",
"date": "3/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'industry': ['Technology', 'Cloud Services'],
                        'name': 'Multiple Enterprises (Unspecified)',
                        'type': 'Organization'}],
 'attack_vector': ['Stolen Credentials',
                   'Phishing',
                   'Malicious NPM Packages',
                   'Exploited CVEs'],
 'data_breach': {'data_exfiltration': 'Yes',
                 'file_types_exposed': ['.env', '.conf', '.log'],
                 'personally_identifiable_information': 'Yes',
                 'sensitivity_of_data': 'High',
                 'type_of_data_compromised': ['Credentials',
                                              'Sensitive Configuration Files',
                                              'Logs']},
 'date_publicly_disclosed': '2026-01-01',
 'description': 'Google’s H1 2026 Cloud Threat Horizons Report highlights a '
                'rapidly evolving threat landscape, including unchecked '
                'identity sprawl, weaponized AI tools, and collapsing '
                'exploitation windows. The report identifies critical '
                'vulnerabilities in enterprise defenses, such as identity '
                'compromise, AI-driven reconnaissance, and rapid exploitation '
                'of disclosed vulnerabilities.',
 'impact': {'data_compromised': ['Credentials',
                                 'Sensitive Files (.env, .conf, .log)',
                                 'Personally Identifiable Information'],
            'identity_theft_risk': 'High',
            'operational_impact': 'Bypassed human oversight; automated '
                                  'reconnaissance and exploitation',
            'systems_affected': ['Kubernetes',
                                 'AWS',
                                 'GitHub',
                                 'LLM Environments']},
 'initial_access_broker': {'entry_point': ['CI/CD Service Accounts',
                                           'GitHub Tokens',
                                           'Malicious NPM Packages'],
                           'high_value_targets': ['AWS Admin Access',
                                                  'Kubernetes Environments']},
 'investigation_status': 'Ongoing',
 'lessons_learned': 'Traditional security measures are insufficient against '
                    'machine-speed threats. Enterprises must adopt AI-native '
                    'security architectures, govern autonomous AI agents, and '
                    'automate response pipelines to keep pace with '
                    'adversaries.',
 'motivation': ['Financial Gain (Cryptocurrency Mining)',
                'Data Exfiltration',
                'Espionage'],
 'post_incident_analysis': {'corrective_actions': ['Adopt AI-native security '
                                                   'architectures.',
                                                   'Automate identity '
                                                   'governance and threat '
                                                   'detection.',
                                                   'Reduce reliance on '
                                                   'human-speed responses.'],
                            'root_causes': ['Unchecked identity sprawl '
                                            '(overprovisioned access).',
                                            'Weaponized AI tools (LLM '
                                            'hijacking for reconnaissance).',
                                            'Collapsing exploitation windows '
                                            '(rapid CVE exploitation).']},
 'recommendations': ['Implement identity governance for autonomous AI agents.',
                     'Monitor LLM activity as a primary threat signal.',
                     'Deploy automated forensic and response pipelines.',
                     'Shift to AI-native security architectures.'],
 'references': [{'source': 'Google’s H1 2026 Cloud Threat Horizons Report'}],
 'response': {'enhanced_monitoring': ['LLM Activity Monitoring',
                                      'Automated Threat Detection'],
              'remediation_measures': ['Automated Forensic Pipelines',
                                       'AI-Native Security Architectures']},
 'threat_actor': ['UNC4899 (North Korean Actors)', 'UNC6426'],
 'title': 'Google’s Cloud Threat Horizons Report: Accelerating Cyber Threats '
          'and Flawed Defenses',
 'type': ['Identity Compromise', 'AI Weaponization', 'Software Exploitation'],
 'vulnerability_exploited': ['Unconstrained CI/CD Service Accounts',
                             'Compromised GitHub Tokens',
                             'Critical CVEs']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.