The recent TruffleNet campaign, first documented by Fortinet, highlights a familiar and uncomfortable truth for security leaders: some of the most damaging cloud attacks aren’t exploiting zero-day vulnerabilities. They’re exploiting identity models that were never designed for the scale and automation of modern cloud environments. Nothing about this attack was novel. That’s precisely the problem.
The TruffleNet campaign did not exploit cloud vulnerabilities or deploy malware. It exploited stolen AWS credentials and the way cloud identity works at scale. Attackers gathered large numbers of AWS access keys and validated them using distributed infrastructure. By making routine calls to the AWS GetCallerIdentity API, they determined which credentials were valid and what permissions they carried. These were standard API calls, indistinguishable from legitimate cloud activity.
With valid access confirmed, the attackers abused trusted cloud services, primarily AWS Simple Email Service (SES). Using the compromised identities, they checked send quotas, verified email identities, and imported DKIM signing keys, enabling them to send authenticated email from trusted AWS infrastructure.
This access was then used to conduct Business Email Compromise (BEC) at scale. Fraud emails impersonated real vendors, included convincing documents like W-9 forms, passed email authentication checks, and led victims to authorize wire transfers and ACH payments.
The key takeaway is simple: the attackers didn’t break into cloud environments, they operated inside them, using valid static long lived credentials in ways traditional controls were never designed to prevent.
From a business perspective, attacks like this cut deeper than a typical security incident.
Cloud platforms are inherently trusted by customers, partners, and internal teams. When attackers successfully operate inside that trust boundary, the consequences multiply quickly:
For CISOs, the most troubling aspect is not the compromise itself, it’s the realization that traditional controls failed by design. The attack didn’t bypass security; it walked through the front door.
At a technical level, this incident reinforces a long-standing but often avoided truth: Static credentials represent a failed by design approach with cloud-scale automation.
The attackers succeeded because:
Once credentials exist independently of runtime context, compromise is inevitable. Detection can’t compensate for what’s already broken.
The instinctive response to incidents like this is to add more monitoring, more alerts, and more anomaly detection. Others double down on credential rotation. While both visibility and rotation matter, neither addresses the architectural flaw at the core of the problem.
You cannot reliably detect, or rotate away malicious use of credentials that are architecturally valid.
If a key is long-lived, broadly scoped, and not tied to a specific workload or execution window, it remains fully usable until someone notices and intervenes. Rotation may shorten the exposure window, but it does not eliminate the value of stolen credentials. Detection still happens after misuse begins.
By the time alerts fire or keys are rotated, attackers have already operated at machine speed, while defenders are still responding at human speed.
Preventing this class of attack requires a shift from credential management to identity-first architecture.
Specifically:
This approach is already proven in high-scale production environments, where workloads are issued short-lived, cryptographically verifiable identity at runtime. The challenge isn’t maturity, it’s adoption and the persistence of legacy identity assumptions built around static credentials.
At Defakto, we see incidents like TruffleNet not as edge cases, but as signals. They reflect an industry still trying to secure machine-driven environments with human-centric identity models. Traditional identity systems were designed for people logging into applications not for the thousands of automated processes, services and workloads that now dominate enterprise infrastructure.
Our Non-Human IAM Platform is purpose-built for this reality. It is architected from the ground up for machine scale automation rather than retrofitted from human identity assumptions that introduce risk, friction and operational drag as automation scales.
By eradicating static secrets and issuing short-lived, cryptographically verifiable identity at runtime, organizations reduce attack surface by design. Stolen credentials lose their value, blast radius is inherently constrained, and access becomes attributable and auditable without relying on after-the-fact investigation.
Just as importantly, this architectural shift delivers measurable business outcomes:
The result is security that scales with the business along with enabling automation, cloud adoption, and AI without trading speed for risk.
The TruffleNet campaign didn’t succeed because of new techniques, but because cloud identity still relies on assumptions that don’t hold at automation scale.
As non-human identities multiply, static credentials and broad permissions become structural liabilities. Security leaders who rethink identity now can scale automation with clear limits on blast radius and exposure by design, not by detection.
The organizations that get this right will move faster with confidence, knowing security is built into the architecture.
*** This is a Security Bloggers Network syndicated blog from Defakto authored by Danny Oliveri. Read the original post at: https://www.defakto.security/blog/trufflenet-and-cloud-abuse-at-scale-an-identity-architecture-failure/