2 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
Hackers are exploiting misconfigured web applications used for security testing to breach Fortune 500 companies. An investigation revealed that over 1,900 vulnerable applications were exposed, allowing attackers to deploy crypto miners and webshells. Many of these apps used default credentials and lacked proper security measures.
If you do, here's more
Hackers are exploiting misconfigured security testing applications to breach the cloud environments of Fortune 500 companies. Research from Pentera reveals that tools like DVWA, OWASP Juice Shop, and Hackazon, intended for internal security training, are being targeted. These applications, often running on AWS, GCP, and Azure, have been found to expose serious vulnerabilities, including default credentials and overly privileged IAM roles. Pentera identified 1,926 live instances of these vulnerable apps, many linked to companies such as Cloudflare, F5, and Palo Alto Networks.
The investigation showed that attackers are actively compromising these systems, deploying crypto miners, webshells, and other malicious tools. Out of 616 DVWA instances examined, about 20% exhibited signs of exploitation. The mining operation used XMRig to mine Monero, while an advanced persistence script, βwatchdog.shβ, allowed attackers to maintain access even after initial detection. Some compromised apps also featured a PHP webshell capable of executing commands and managing files, further increasing the risk to sensitive data.
Pentera's findings highlight the urgent need for companies to reassess their security practices. Recommendations include maintaining an inventory of all cloud resources, isolating testing applications, enforcing least-privilege IAM roles, and changing default credentials. These steps aim to prevent unauthorized access and ensure that testing environments do not become a gateway for attacks.
Questions about this article
No questions yet.