Exposed Cloud Training Apps Now a Major Enterprise Risk as Crypto-Mining and Exploits Spread


Training and demo web applications that are meant to run in safe, isolated environments are being found publicly exposed on enterprise cloud systems. Security research from Pentera Labs shows that these vulnerable applications are now being actively exploited by threat actors to gain access to broader cloud infrastructure, deploy crypto-mining software, and install persistence tooling across Fortune 500 organisations and leading security vendors.

Pentera Labs found nearly 2,000 exposed and vulnerable applications such as OWASP Juice Shop, Damn Vulnerable Web Application (DVWA), Hackazon, and bWAPP running on major cloud platforms including AWS, Azure, and Google Cloud Platform (GCP). Many of these appear on the public internet with minimal isolation, default configurations, and over-permissive cloud identity roles that give threat actors a foothold to expand their reach.

“One misconfigured training app was enough for attackers to obtain cloud credentials and deploy miners at an organization’s expense,” said Noam Yaffe, Senior Security Researcher at Pentera Labs and Team Lead of Pentera’s Offensive Security Services. “These systems may be labeled ‘non-production,’ but the access they expose is very real for thousands of organisations.”

These findings show that deployed training environments, when treated as low-priority assets, can quickly become entry points for attackers moving within an organisation’s cloud estate.

How Training Applications Are Being Misused

Many organisations spin up vulnerable demonstration applications for learning sessions, demos, or internal testing. These include open-source insecure projects intentionally built to demonstrate vulnerabilities.

In theory, these tools should run in isolated labs without real access to business systems. In practice, many are deployed inside live cloud accounts with broad identity and access management (IAM) roles and default credentials, creating a much larger attack surface than intended.

How Training Applications Are Being Misused

Many organisations spin up vulnerable demonstration applications for learning sessions, demos, or internal testing. These include open-source insecure projects intentionally built to demonstrate vulnerabilities.

In theory, these tools should run in isolated labs without real access to business systems. In practice, many are deployed inside live cloud accounts with broad identity and access management (IAM) roles and default credentials, creating a much larger attack surface than intended.

In verified cases, researchers identified 109 unique credential sets that could grant extensive permissions, including administrative access to cloud storage and compute resources.

Evidence of Active Exploitation

Pentera Labs documented real evidence of attacker abuse across these exposed instances.

About 20 percent of identified vulnerable applications showed clear signs of compromise. Malicious artifacts included:

  • Crypto-mining software such as XMRig, actively mining Monero.
  • Webshells and obfuscated scripts allowing command execution.
  • Persistence mechanisms that survive attempted clean-ups.
  • Credential theft and extraction scripts tied to overly permissive roles.

These active threats were not spread across small projects or isolated systems. Many were found on enterprise-owned cloud infrastructure, including instances connected with organisations like Cloudflare, F5, and Palo Alto Networks.

In some cases, vulnerable demos like DVWA were still using default credentials such as admin:password, which made exploitation trivial for automated tools and human attackers alike.

Why This Threat Is Dangerous for Cloud Security

Training and demo applications are often treated as temporary or “non-critical,” leading to three dangerous assumptions:

They will be removed or isolated later, so exposure is temporary.

They pose no real risk because they are not part of production systems.

Default configurations and credentials are acceptable because no real data lives there.

Pentera Labs’ findings challenge all three assumptions. Exposed training apps frequently remain online long after deployment. They often run alongside real workloads with cloud identities attached that have broad permissions. These identities let attackers pivot into more sensitive areas of the cloud environment.

Once attackers gain access to cloud metadata, they can move laterally, escalate privileges, or access services such as object storage, secrets managers, and container registries. They can even alter CI/CD pipelines or insert themselves into the organisation’s software supply chain.

Comparison: Training Apps vs. Production Risk

CategoryTraining App (Typical)Production Environment
Intended PurposeSecurity lab/demo/testBusiness critical services
Access ControlsOften minimalUsually enforced strict IAM
ExposurePublic internetTypically internal / firewalled
Credential RiskLinked to cloud identity rolesManaged securely with restrictions
Exploitation EvidenceHigh risk now confirmedMajor concern if breached

This comparison shows why training apps once thought isolated have become vectors for real attacks when left in production cloud accounts.

Best Practices to Mitigate Risk
To protect cloud environments from exploitation via training applications, organisations should:

To protect cloud environments from exploitation via training applications, organisations should:

Inventory all cloud assets including test, training, and demo apps.
Enforce least-privilege IAM roles and remove default credentials.
Isolate non-production environments from production cloud accounts.
Monitor and log access to exposed services for unusual activity.
Remove or relocate exposed training apps from public IPs.
Integrate continuous scanning and cloud posture checks in CI/CD pipelines.

FAQ: Cloud Training App Exposure and Exploitation

What kinds of training apps are involved?

Common vulnerable training tools include OWASP Juice Shop, DVWA, Hackazon, and bWAPP deployed for demos or training.

How many vulnerable instances were found?

Pentera Labs found nearly 1,926 verified, internet-exposed training applications.

What percentage showed active exploitation?

About 20 percent of identified exposed instances had indicators of compromise, such as crypto miners or webshells.

Which cloud providers were affected?

Exposed applications were hosted across AWS, Google Cloud Platform, and Microsoft Azure environments.

Can attackers move beyond the training app?

Yes. Once attackers gain initial access, they can use cloud metadata and misconfigured IAM roles to move laterally and escalate privileges.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages