Credential theft surged in 2025, with the number of credentials used by attackers up by 800% and publicly available exploits up by 179% over previous years, according to CSO Online. This shift has made credential theft the most common entry point for ransomware attacks in Australian cloud-based organisations. Remote access, VPNs and identity-driven cloud systems have expanded the attack surface, creating ideal conditions for adversaries to use stolen credentials to impersonate legitimate users and breach sensitive workloads.
What can Australian businesses prioritise to detect and prevent identity-based compromises? How do cloud environments change the attacker’s playbook? What are the practical steps that reduce exposure to identity-driven ransomware?
Source: CSO Online
The Ransomware Threat Landscape in Australia
As Australian organisations continue to adopt cloud-native and hybrid cloud infrastructures, credential-based attacks have become one of the most effective ways for adversaries to access sensitive workloads, particularly in environments that rely on remote access and cloud identity systems.
The Australian Cyber Security Centre reports that nearly half of the confirmed cybersecurity incidents it responds to involve malware or ransomware, reinforcing the prevalence of these attacks. In cloud and hybrid environments, unsecured identity and access controls significantly increase the risk of ransomware incidents and prolong detection timelines.
Understanding Credential Theft and Why Attackers Rely on It
Credential theft is the unauthorised acquisition of authentication secrets, including usernames, passwords, session tokens, private keys or other credentials. Attackers rely on credential theft because identity in cloud environments has effectively replaced the traditional network perimeter, which is the boundary between an organisation’s internal network and the internet.
Once attackers obtain legitimate credentials for a user or service account, they can impersonate that identity, bypass traditional security controls, blend into regular activity, and gain access without apparent signs of compromise.
The Credential-to-Ransomware Kill Chain: How an Attack Unfolds
- Initial Access: Attackers obtain valid credentials through phishing, infostealers, credential stuffing, or purchases from dark web marketplaces. In 2025, infostealer-driven credential theft increased by 84%.
- Privilege Escalation: Using valid credentials, attackers assume roles, escalate privileges, or access service accounts. In cloud environments, excessive permissions or misconfigured IAM roles often enable rapid escalation.
- Lateral Movement: With access to one account, attackers move across the environment using cloud-native identity paths, services and APIs. Identity becomes the primary attack surface rather than the network.
- Persistence and Staging: Attackers maintain access, disable detection, exfiltrate data, and interfere with backups or logs to prepare for ransomware deployment. In many incidents, ransomware is launched days or weeks after initial compromise.
- Ransomware Deployment and Data Extortion: The ransomware payload is executed, or data is encrypted or exfiltrated. Because access is achieved using valid credentials, detection is often delayed or bypassed.
In cloud-native environments, this attack chain is highly effective. A single compromised credential can lead to a complete takeover of the entire environment.
The Impact of Credential-Based Ransomware Attacks
Credential-driven ransomware attacks result in operational downtime, reputational damage, regulatory exposure under Australian privacy and breach notification obligations, and substantial financial loss. In cloud-native environments, misconfigured identity permissions or exposed services can amplify the impact by allowing attackers to compromise a broader range of systems and workloads.
Because these attacks exploit identity rather than software vulnerabilities, traditional patching and backup strategies alone are insufficient. Backups may be encrypted or deleted, and identity-based access allows attackers to evade detection until substantial damage has occurred.
Why Traditional Ransomware Defences Fail in Cloud-Native AWS Environments
Many organisations still approach ransomware primarily as a data protection problem by focusing on patching, backups, endpoint security and email filtering. In cloud-native AWS environments, this approach fails for several reasons.
- Cloud infrastructure is highly dynamic, with services, permissions and configurations constantly changing.
- Privileged IAM roles, cross-account trust relationships, service accounts, automation pipelines and APIs create complex identity paths that increase blast radius.
- Backups alone cannot protect environments when attackers hold valid credentials, as they can delete snapshots, disable backup services, or encrypt resources, making recovery impossible.
Preventing Credential-Driven Ransomware: A Cloud-Native Strategy
To reduce ransomware exposure in AWS environments, organisations need a cloud-native, identity-first security approach.
- Identity hygiene and least privilege: Enforce least-privilege IAM roles, remove long-lived credentials, and regularly review permissions and trust relationships.
- Multi-factor authentication (MFA) and credential policies: Apply MFA to all accounts, including privileged and fallback accounts. Enforce strong credential standards and regular rotation.
- Credential leak and dark web monitoring: Monitor for exposed credentials and tokens on dark web marketplaces and respond quickly by rotating compromised credentials.
- Segmentation and rapid containment: Use account segmentation, isolate production workloads, and monitor for unusual role assumption or cross-account activity.
- Cloud penetration testing and adversary simulation: Regularly test identity compromise scenarios, misconfigurations and privilege escalation paths to uncover risk before attackers do.
- Backup and restore with an identity-first focus: Maintain isolated, immutable backups that remain protected even if identity controls are compromised.
- AI-driven identity and access monitoring (IAM): Use behaviour analytics and anomaly detection to identify suspicious credential use, role assumption and token activity.
Conclusion
Credential theft is now one of the most common and effective initial access vectors for ransomware. As attackers increasingly rely on stolen credentials, particularly VPN and cloud credentials, cloud-first and AWS-native organisations face growing identity-based risk. Traditional ransomware defences focused on patching, perimeter security and backups are no longer sufficient.
Treating identity as the primary security boundary and implementing cloud-native, identity-first controls significantly reduces the likelihood and impact of credential-driven ransomware attacks.
RedBear Helps Australian Orgs Stay Ahead of Identity-Based Attacks
RedBear specialises in AWS-native environments and brings over a decade of experience securing cloud-first infrastructure across enterprise, government and critical infrastructure in Australia and the APAC region.
Our cloud penetration testing identifies misconfigured IAM policies, exposed services and risky role-assumption paths before attackers exploit them. We provide clear, actionable reports for both technical teams and executives, supported by practical guidance for remediation.
If your organisation operates AWS infrastructure, our team can assess your environment, simulate identity-based attacks, and deliver a targeted remediation plan that strengthens your security posture. Visit our Cloud Penetration Testing page for more details.

