Exposed Security Training Apps Like OWASP Juice Shop Create Backdoors into Corporate Clouds

Threat Actors Exploit Publicly Exposed Security Training Apps to Breach Cloud Infrastructure of Major Firms

HIGH
January 22, 2026
5m read
Cloud SecurityCyberattackVulnerability

Related Entities

Products & Tech

OWASP Juice Shop Damn Vulnerable Web Application (DVWA)bWAPPHackazon

Full Report

Executive Summary

A report published on January 21, 2026, has uncovered a significant and ironic security risk: intentionally vulnerable applications designed for cybersecurity training are being exploited in the wild. Applications like OWASP Juice Shop, Damn Vulnerable Web Application (DVWA), and bWAPP are being deployed on production cloud environments (AWS, Google Cloud, Azure) and left exposed to the internet. Threat actors are actively exploiting these built-in vulnerabilities to gain initial access, steal cloud credentials, deploy malware, and pivot into sensitive corporate networks. This widespread misconfiguration has created an inadvertent supply chain risk, turning educational tools into active backdoors for major corporations and even security vendors, leading to confirmed compromises and data exposure.


Threat Overview

The core of the threat lies in a simple but dangerous misconfiguration. Developers and security teams are deploying these training applications for learning purposes but are failing to isolate them from production environments. Over 10,000 such instances were discovered exposed online.

  • Attack Vector: Threat actors scan the internet for the digital fingerprints of these known-vulnerable applications. Once found, they use the well-documented vulnerabilities within them as a direct entry point.
  • Exploitation: Instead of a controlled lab environment, the attackers land on a server with live production credentials and network access. They have been observed using these footholds to:

Technical Analysis

In a confirmed case study, an attacker exploited an insecure file upload function in a publicly exposed Hackazon instance running on a production AWS server. This allowed them to upload a webshell. From there, the attacker queried the AWS metadata service endpoint (http://169.254.169.254) to retrieve temporary IAM role credentials attached to the EC2 instance. These credentials granted them access to sensitive S3 buckets and other resources within the company's production environment, demonstrating a clear path from a misconfigured training app to a significant data breach.

Impact Assessment

The consequences of this misconfiguration are severe:

  • Credential Theft: Exposure of IAM roles, storage access keys, and other cloud service credentials.
  • Data Breach: Attackers can access and exfiltrate sensitive corporate and customer data from cloud storage and databases.
  • Financial Loss: The cost of cryptojacking can be substantial, along with the costs of incident response and remediation.
  • Reputational Damage: The discovery that a company was breached via its own security training tools is highly damaging to its reputation, particularly for security vendors.
  • Supply Chain Risk: When a security vendor is compromised in this way, it can create a downstream risk for all of its customers.

Detection & Response

  1. Asset Discovery: Organizations must actively scan their public cloud environments for any instances of these known-vulnerable training applications. Use cloud security posture management (CSPM) tools or custom scripts to search for application names, default ports, and other indicators.
  2. Monitor Cloud Logs: Analyze AWS CloudTrail, Azure Monitor, or Google Cloud Audit Logs for suspicious activity originating from the IP addresses of these training app instances. Pay close attention to unusual API calls, such as sts:AssumeRole or s3:ListBuckets from an unexpected source.
  3. Behavioral Analysis: Use D3FEND's User Behavior Analysis principles to look for anomalous usage of IAM credentials, especially those associated with EC2 instances running these applications.

Mitigation

  1. Isolate Training Environments: This is the most critical mitigation. All security training and testing must be conducted in a completely isolated network segment or a dedicated cloud account with no access to production data or credentials. This is an application of MITRE ATT&CK Mitigation M1048 - Application Isolation and Sandboxing.
  2. Strict Network Policies: If these apps must be deployed, apply strict ingress and egress firewall rules to limit access to only authorized users and prevent the instance from communicating with the public internet or internal production services. (M1030 - Network Segmentation).
  3. Principle of Least Privilege: Never attach production IAM roles or credentials to instances running training applications. If a role is needed, it should be custom-created with minimal, restricted permissions.
  4. Regular Audits: Implement a policy and automated checks to regularly audit cloud environments for these applications and enforce their removal or isolation.

Timeline of Events

1
January 21, 2026
Field Effect publishes a report on the exploitation of exposed security training applications.
2
January 22, 2026
This article was published

MITRE ATT&CK Mitigations

Ensure that training applications are run in isolated environments (sandboxes, dedicated cloud accounts) with no connectivity to production systems or credentials.

Mapped D3FEND Techniques:

Use strict network policies to logically separate training environments from all other corporate network segments.

Mapped D3FEND Techniques:

Implement and enforce secure configuration policies that forbid the deployment of non-production, insecure applications within production environments.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The fundamental mitigation for this threat is strict network isolation. Security training applications like OWASP Juice Shop or DVWA must never share a network environment with production systems. Organizations should establish a dedicated 'sandbox' VPC or cloud account for all security training activities. This environment must have a default-deny network policy, with no network path to any production or corporate resources. Furthermore, it should have highly restrictive egress filtering to prevent any compromised instance from calling out to the internet for C2 or exfiltration. By treating the training environment as inherently hostile and untrusted, organizations can prevent attackers from using it as a pivot point into valuable networks.

While the name is specific, the principle of monitoring cloud service interactions is key. Use Cloud Security Posture Management (CSPM) and Cloud-Native Application Protection Platform (CNAPP) tools to continuously scan for misconfigured deployments. These tools can identify public-facing instances running known-vulnerable applications and check for dangerous configurations, such as having production IAM roles attached. Create automated alerts that trigger when an EC2 instance or container is deployed with a tag like 'training' or 'test' but is also assigned a role with production access or is located in a production network segment. This automated oversight is essential for preventing the manual errors that lead to this type of breach.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Cloud SecurityMisconfigurationAWSAzureOWASP Juice ShopSupply Chain AttackCredential Theft

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading