Recently, security researchers detected a common sense failure with real consequences: web applications designed for training and testing - such as DVWA, OWASP Juice Shop, Hackazon or bWAPP - were accessible from the Internet on cloud accounts with high privileges, and the attackers soon took advantage of it. What is used in many teams to teach hacking techniques or validate controls was exposed as a back door to productive environments in suppliers such as AWS, Google Cloud and Azure.
The finding, documented by the Pentera laboratories and collected by specialized means, reveals that there were hundreds and hundreds of living instances of these deliberately vulnerable applications published on the public network. According to the investigation data, they were located close to 1,926 test applications exposed, and a significant proportion of them announced cloud credentials or was accompanied by roles with excessive privileges, breaking the basic rule of "minor privilege." You can check the researchers' work on the Pentera laboratories page: Pentera Labs and the journalistic follow-up in BleepingComputer.

This is not theory: analysts found evidence of active exploitation. In many instances they checked malicious artifacts - from cryptomoneda miners to webshells - that demonstrated a real commitment. In the set of DVWA instances analyzed, for example, approximately 20% contained traces of malicious activity. The attackers used tools such as XMRig to mine Monero, and deployed mechanisms to stay in the affected machines, including a persistence script that restored itself and downloaded the mine from public repositories. The XMRig project is publicly documented in its repository: XMRig in GitHub.
In addition to mining, documented incidents included the installation of a PHP webshell called filemanager.php that allowed to read, write, delete, download and run commands on the system. The webshell code kept embossed credentials and, curiously, had the time zone adjusted to Europe / Minsk, a detail that the researchers pointed out as possible evidence of the origin of the operators.
How did you get to this? In many cases the test applications were implemented in cloud accounts associated with roles with extensive permissions, without applying the principle of minor privilege, and maintained credentials by default or without rotation. In other words, three classic errors were combined: exposing an Internet testing environment, not restricting cloud access and not managing credentials correctly. The credentials found by the investigators could have allowed an attacker to read and write in object stores such as S3, GCS or Azure Blob, access to managed secrets, interact with container records or even climb account administrators.
The companies concerned identified in the study include names recognized between Fortune 500 and security providers, which were notified and proceeded to remedy the incidents following the notice. The episode highlights that even organizations with good practice on many fronts can stumble into the management of non-productive environments.
The practical lesson is simple and urgent: test environments must be treated with at least the same care as systems in production. This is to maintain a complete inventory of resources in the cloud - including laboratories, demos and training machines - and to isolate them from critical environments. It is also essential to apply roles with minimum privileges, change any default credential and set automatic decidencies for temporary resources. Cloud providers maintain detailed guides on good identity management practices and access that should be followed, such as AWS's AMI documentation: Good practice of AMI (AWS), the Google Cloud IAM guide: IAM (Google Cloud) and access control resources in Azure: Azure Active Directory.
In terms of detection and response, typical abuse patterns should be monitored: unusual use of CPU and network (which can report mining), downloads from unusual sites (e.g. public repositories or cloud storage services), creation of persistent processes and presence of files or scripts with base64-coded content. It is also recommended to audit access to secret managers and container image deposits, and to review configuration and deployment log to detect instances that should not be public.

If your team maintains testing or training environments, reviewing the deployment templates and processes is a priority. Tools and projects designed to teach safety such as DVWA, OWASP Juice Shop or bWAPP are valuable resources, but its use in environments connected to high-privilege accounts without proper controls makes a didactic tool an almost guaranteed risk.
History also leaves a greater warning: security is not just technology, it is operational discipline. Maintaining an inventory, implementing less privileged policies, rotating credentials, automating decidencies and segmenting networks and accounts are basic controls that, when they fail, have tangible consequences. To deepen the nature of these threats and the research behind the finding, you can read the researchers' public materials and follow the specialized coverage of reliable technological media.
In the end, the moral is clear: do not underestimate what a "laboratory" application can do when combined with a cloud account with excessive permissions. What starts as a test environment can end up being the entry path for crypt- min-, malicious persistence or, worse, the jump to sensitive assets of the organization.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...