The Credential Compromise Problem
This is a familiar pattern by now - attackers harvest compromised or leaked cloud credentials and use them from anywhere in the world to penetrate cloud environments to get access to business critical or private customer data.