* [Blog](https://www.paloaltonetworks.com/blog) * [Cloud Security](https://www.paloaltonetworks.com/blog/cloud-security/) * [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/) * Stories from the Darkside... # Stories from the Darkside: A Set of Stolen Access Keys and a Complete Cloud Takeover [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fpreventing-cloud-takeover-access-keys%2F) [](https://twitter.com/share?text=Stories+from+the+Darkside%3A+A+Set+of+Stolen+Access+Keys+and+a+Complete+Cloud+Takeover&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fpreventing-cloud-takeover-access-keys%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fpreventing-cloud-takeover-access-keys%2F&title=Stories+from+the+Darkside%3A+A+Set+of+Stolen+Access+Keys+and+a+Complete+Cloud+Takeover&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/cloud-security/preventing-cloud-takeover-access-keys/&ts=markdown) \[\](mailto:?subject=Stories from the Darkside: A Set of Stolen Access Keys and a Complete Cloud Takeover) Link copied By [Cameron Hyde](https://www.paloaltonetworks.com/blog/author/cameron-hyde/?ts=markdown "Posts by Cameron Hyde") and [Emily Rodenhuis](https://www.paloaltonetworks.com/blog/author/erodenhuis/?ts=markdown "Posts by Emily Rodenhuis") Sep 26, 2024 9 minutes [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown) [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam/?ts=markdown) [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam-2/?ts=markdown) [data security](https://www.paloaltonetworks.com/blog/tag/data-security/?ts=markdown) The simplicity of this attack isn't what makes it shocking. It's not even the speed with which the attacker seized control of an entire cloud environment. The alarming part is that it didn't take advanced techniques to break in. The mistakes that allowed this to happen? Well, they happen. All. The. Time. So what should we have done to prevent the attack? Let's first look at how it unfolded. ## The Attack Breakdown Launching a brute-force attack on a user account with weak credentials, the attacker gains access to the system. Once inside, they locate a JSON file on the disk that contains an access key. They copy this key to their system, and using the stolen key, they successfully authenticate. In the environment, the attacker discovers that the compromised service account has overly permissive access, including owner permissions. The excessive level of permissions exposes the system, particularly because it should never be granted to a service account (machine access). Seizing the opportunity, the attacker writes a script designed to download all the data available in cloud storage. They begin enumerating serverless function environment variables, as these often contain sensitive information that could advance the attack. Having uncovered valuable details --- access tokens or configuration data --- the attacker uses the owner's permissions to move laterally through the system, targeting virtual machines. Along the way, they find a shared jumpbox used by multiple users, which contains cloud credentials for various users, significantly widening the attack surface. At this point, the attacker spots their target --- an account with owner permissions to critical areas. It's linked to human resources, sales and IT projects. They seize control of the account and with a few swift commands, the entire cloud environment falls under their control. ![The nine-step attack took only hours for the attacker to breach sales, HR and IT data.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/09/word-image-328616-1.png) Figure 1: The nine-step attack took only hours for the attacker to breach sales, HR and IT data. ## Breaking Up This Attack Path Many interconnected risks, rather than one, led to the success --- and magnitude --- of this attack. Let's take a look at the various components and what security measures and best practices could have prevented or limited the damage. ### IAM and the Principle of Least Privilege According to a recent Microsoft report, [more than 50% of identities are super admins](https://www.microsoft.com/cms/api/am/binary/RW10qzO#:~:text=This%20report) --- users or workloads that have access to all permissions and resources. Nothing says we have an urgent need to reassess access management policies to protect [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data?ts=markdown) and infrastructure like the absence of foundational IAM best practices. In the attack breakdown, the attacker leverages a compromised service account with overly permissive access. This highlights a critical flaw in [identity and access management (IAM)](https://www.paloaltonetworks.com/cyberpedia/what-is-identity-and-access-management?ts=markdown) --- ignoring the principle of least privilege. The least privilege principle dictates that each user or service should only have the minimum permissions necessary to perform their role. Excessive permissions, like the owner permissions granted to the service account, create an attack surface inviting exploitation. To prevent attacks like this, security teams must enforce least privilege policies across all accounts, especially service accounts (machine users), which are often overlooked and pose a significant risk when granted broad permissions. With this attack, the service account could perform actions beyond its scope, such as accessing sensitive data --- and inadvertently allowing the attacker to move laterally within the environment. #### Actionable IAM Guidelines 1. **Understand the** [**net-effective permissions**](https://www.paloaltonetworks.com/blog/prisma-cloud/net-effective-permissions-iam/?ts=markdown)**assigned to identities** : Can you definitively say who has access to what? Unless you have complete visibility across your cloud ecosystem, it's unlikely you have access to each user's (human and machine) [net-effective permissions](https://www.paloaltonetworks.com/blog/prisma-cloud/net-effective-permissions-iam/?ts=markdown), considering that each CSP has its own unique IAM policy framework and user IdPs. ***Related Article*** *:* [*Why Are Net-Effective Permissions Critical for Cloud IAM?*](https://www.paloaltonetworks.com/blog/prisma-cloud/net-effective-permissions-iam/?ts=markdown) 1. **Conduct regular audits** of all permissions, focusing on service accounts. Remove any excessive or unnecessary permissions that don't align with the account's intended purpose. 2. **Use role-based access controls (RBAC)** to assign permissions based on specific roles. Ensure service accounts only have access to resources needed for their function, and nothing more. 3. **Implement time-bound or just-in-time access** for high-privilege accounts. In cases where elevated privileges are required temporarily, limit the window of time for those permissions. [Least-privileged access](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access?ts=markdown) could have prevented the attack from escalating. Even if the initial brute-force attack succeeded, limited permissions would have stopped the attacker from downloading sensitive data or moving laterally across the environment. ### Multifactor Authentication (MFA) The attack began with a [brute-force attack](https://www.paloaltonetworks.com/cyberpedia/brute-force?ts=markdown) on a weak user password, exposing a vulnerability that could have been neutralized by multifactor authentication ([MFA](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-factor-authentication?ts=markdown)). Had MFA been enforced, the attacker would have needed a second form of authentication to access the environment, making a successful brute-force attempt less likely. MFA could have minimized damage at several key stages of the attack: 1. **Initial entry**: Enforcing MFA on all user accounts, especially those with access to cloud resources, would have blocked the attacker from logging in with stolen or guessed credentials. 2. **Lateral movement**: MFA combined with role-based access control could have been applied to sensitive areas, such as virtual machines or data storage. Each attempt to move laterally would require additional verification, significantly slowing the attacker's progress. 3. **Account takeover**: If MFA was required for high-privilege actions, like accessing the HR, sales or IT projects, the attacker would have been stalled or blocked from taking full control of the environment. #### Actionable MFA Guidelines * **Mandate MFA for all cloud access**: Every user account, including service accounts where applicable, should require MFA to authenticate. * **Ensure MFA is used for sensitive actions**: Activities such as changing permissions, accessing sensitive data or performing administrative tasks should trigger an MFA prompt. * **Regularly test MFA setups** : Conduct [phishing](https://www.paloaltonetworks.com/cyberpedia/what-is-phishing?ts=markdown) simulations and test MFA systems to ensure they are working effectively and that users understand their importance. By enforcing MFA, the attacker's ability to gain access to the environment and escalate privileges would have been significantly hindered, likely stopping the attack before it began. ### Data Security Posture Management (DSPM) Once inside the system, the attacker wrote a script to download data from cloud storage, exploiting the lack of data security controls, emphasizing the need for [data security posture management (DSPM)](https://www.paloaltonetworks.com/cyberpedia/what-is-dspm?ts=markdown) technology and strategy. In this attack, cloud storage permissions were left wide open, and sensitive data was easily accessible once the attacker gained the required permissions. DSPM tools continuously monitor and assess data storage systems to ensure that sensitive data is protected, access is limited, and anomalies are quickly identified. #### Actionable DSPM Guidelines 1. **Classify and tag sensitive data**: Security teams should properly classified and labeled data in the cloud, as it allows for better management of access controls, encryption and monitoring. 2. **Enforce strict access controls on storage**: Storage buckets and databases should be accessible only by specific roles. Public or overly permissive access to cloud storage is a critical vulnerability. 3. **Monitor and alert on abnormal activity**: DSPM solutions can flag unusual data download patterns or bulk access to storage resources, which would have detected the attacker's script downloading large amounts of data. 4. **Encrypt sensitive data at rest and in transit**: Encryption adds another layer of security, ensuring that even if the attacker accessed the data, they wouldn't be able to easily read or use it. A proactive DSPM strategy would have raised red flags the moment the attacker began accessing cloud storage, allowing the security team to respond before the data could be fully compromised. ### Detect Malicious Activity and Respond One of the most critical failures in the attack was the lack of monitoring for anomalous behavior. Threat detection leveraging [user and entity behavior analytics (UEBA)](https://www.paloaltonetworks.com/prisma/cloud/cloud-threat-detection?ts=markdown) could have detected several suspicious actions early in the attack, long before the attacker took control of the cloud environment. UEBA works by establishing a baseline of normal user and system behavior, then flagging any deviations from this baseline as potential threats. In this attack, several activities would have triggered alerts: 1. **Brute-force login attempts**: UEBA would have detected multiple failed login attempts of a legitimate user account and immediately flagged the activity as suspicious. It could have blocked or quarantined the account until verified by the security team. 2. **Access to unusual resources**: The attacker accessed a JSON file containing an access key, which may have been outside the typical usage for the compromised account. UEBA would detect such unusual file access and trigger an alert. 3. **Unusual data downloads**: When the attacker began downloading data from cloud storage, UEBA would have flagged the activity as abnormal, especially if it deviated from typical usage patterns for the service account. #### Actionable Guidelines for Anomaly Detection * **Deploy UEBA tools that monitor across the entire cloud environment**: 'Entire environment' includes IAM activity, storage access and application behavior. * **Set up alerts for anomalies**: Configure alerts for any deviations from baseline behaviors, such as unexpected login attempts, data access or permissions changes. * **Conduct regular behavior analysis**: Regularly review and update the baseline behaviors to adapt to evolving business needs and emerging threats. UEBA could have stopped the attack early by detecting the brute-force attempt or unusual data access patterns. Implementing UEBA as part of a broader monitoring strategy ensures that even when an attacker slips past traditional defenses, their actions will not go unnoticed. ## Cloud Security Platform Reduces Risk and Eliminates Breaches The highlighted attack underscores the persistent and evolving threats in cloud environments, as well as the importance of rigorous and proactive security. [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) empowers organizations to get ahead of threat actors and effectively reduce security incidents, including [data breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach?ts=markdown). By integrating comprehensive security measures across the application lifecycle, the Code to Cloud^TM^ platform enables teams to ship secure code from the outset, fortify application infrastructure, and stop sophisticated attacks in real time. Leveraging Precision AI^TM^, Prisma Cloud proactively identifies vulnerabilities --- enforcing best practices --- and ensures continuous compliance. ## Learn More For more IAM best practices, check out our infographic [CIEM: Identity Is the New Perimeter](https://paloaltonetworks.com/resources/infographics/ciem-identity-is-the-new-perimeter). And if you haven't tried Prisma Cloud and wonder how our Code to Cloud^TM^ platform could have helped you prevent this attack, consider booking a [personalized demo](https://www.paloaltonetworks.com/prisma/cloud/request-a-prisma-cloud-demo?ts=markdown) or registering for a free[30-day Prisma Cloud trial](https://www.paloaltonetworks.com/prisma/request-a-prisma-cloud-trial?ts=markdown). *** ** * ** *** ## Related Blogs ### [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam-2/?ts=markdown), [Identity Security](https://www.paloaltonetworks.com/blog/cloud-security/category/identity-security/?ts=markdown), [KSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/kspm/?ts=markdown) [#### Turning Kubernetes Last Access to Kubernetes Least Access Using KIEMPossible](https://www.paloaltonetworks.com/blog/cloud-security/kubernetes-identity-security-kiempossible/) ### [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [DSPM](https://www.paloaltonetworks.com/blog/cloud-security/category/dspm/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam-2/?ts=markdown) [#### All Paths Lead to Your Cloud: A Mapping of Initial Access Vectors to Your AWS Environment](https://www.paloaltonetworks.com/blog/cloud-security/aws-initial-access-cloud-perimeter-security/) ### [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem-2/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [IAM](https://www.paloaltonetworks.com/blog/cloud-security/category/iam-2/?ts=markdown) [#### Regaining Control Over Identity and Access](https://www.paloaltonetworks.com/blog/cloud-security/cloud-vs-on-premises-permissions-ciem/) ### [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Data Security Posture Management](https://www.paloaltonetworks.com/blog/cloud-security/category/data-security-posture-management/?ts=markdown) [#### Use Microsoft Sensitivity Labels in Your Multicloud Security Strategy with Cortex Cloud DSPM](https://www.paloaltonetworks.com/blog/cloud-security/mpip-sensitivity-labels-dspm/) ### [Cloud NGFW](https://www.paloaltonetworks.com/blog/network-security/category/cloud-ngfw/?ts=markdown), [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown) [#### Modernizing Security on AWS: From Firewall Ops to Security Intent](https://www.paloaltonetworks.com/blog/network-security/modernizing-security-on-aws-from-firewall-ops-to-security-intent/) ### [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [Software Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/software-firewalls/?ts=markdown) [#### Turn Your Multicloud Security into a Business Enabler](https://www.paloaltonetworks.com/blog/network-security/turn-your-multicloud-security-into-a-business-enabler/) ### Subscribe to Cloud Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language