top of page
perceptive_background_267k.jpg

The Double-Edged Sword of Non-Human Identities

Published:

4 februari 2026 om 15:05:15

Alert date:

4 februari 2026 om 16:00:59

Source:

bleepingcomputer.com

Click to open the original link from this advisory

Cloud & Virtualization, Identity & Access, Data Breach & Exfiltration, Supply Chain & Dependencies

Analysis of how leaked non-human identities such as API keys and tokens are becoming major drivers of security breaches in cloud environments. The article discusses how exposed machine credentials provide attackers with quiet, long-term access to enterprise systems. Flare research demonstrates the growing threat posed by compromised automated system credentials in cloud infrastructures.

Technical details

Over 10,000 Docker Hub container images were found leaking secrets including production API keys, cloud tokens, CI/CD credentials, and AI model access tokens in public repositories. Non-human identities (tokens, API keys, service accounts, workload identities) are machine-to-machine credentials that authenticate applications and services continuously with broad privileges and indefinite lifespans, unlike human users who use passwords and MFA. The Snowflake breach affected 165 organizations through UNC5537 threat actors using exposed credentials from infostealer malware dumps. Home Depot experienced a year-long exposure via a single leaked GitHub access token granting read/write access to hundreds of private repositories and connected cloud infrastructure. Red Hat GitLab instance was compromised by Crimson Collective, exfiltrating thousands of private repositories containing embedded credentials, tokens, and database URIs.

Mitigation steps:

Treat container images like code AND credentials as potential leak vectors for sensitive keys
Integrate automated secret scanning at every stage of the SDLC to catch leaks before images are pushed to public repositories
Adopt short-lived, ephemeral credentials backed by identity federation rather than long-lived tokens baked into images
Monitor for exposed keys in public registries and revoke them proactively
Treat non-human identities as human identities by monitoring their behavior, limiting their access, and deleting them when no longer needed
Use specialized Threat Exposure Management platforms that continuously scan public registries and code repositories for exposed credentials
Implement automated detection and revocation capabilities for organizations managing thousands of non-human identities

Affected products:

Docker Hub
Snowflake
GitHub
GitLab
AT&T
Ticketmaster
Santander
Home Depot
Red Hat
AWS
Azure
GCP
MongoDB
PostgreSQL

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page