A report published on January 21, 2026, has uncovered a significant and ironic security risk: intentionally vulnerable applications designed for cybersecurity training are being exploited in the wild. Applications like OWASP Juice Shop, Damn Vulnerable Web Application (DVWA), and bWAPP are being deployed on production cloud environments (AWS, Google Cloud, Azure) and left exposed to the internet. Threat actors are actively exploiting these built-in vulnerabilities to gain initial access, steal cloud credentials, deploy malware, and pivot into sensitive corporate networks. This widespread misconfiguration has created an inadvertent supply chain risk, turning educational tools into active backdoors for major corporations and even security vendors, leading to confirmed compromises and data exposure.
The core of the threat lies in a simple but dangerous misconfiguration. Developers and security teams are deploying these training applications for learning purposes but are failing to isolate them from production environments. Over 10,000 such instances were discovered exposed online.
T1190 - Exploit Public-Facing Application).T1505.003 - Web Shell).T1496 - Resource Hijacking).T1552.005 - Cloud Instance Metadata API).In a confirmed case study, an attacker exploited an insecure file upload function in a publicly exposed Hackazon instance running on a production AWS server. This allowed them to upload a webshell. From there, the attacker queried the AWS metadata service endpoint (http://169.254.169.254) to retrieve temporary IAM role credentials attached to the EC2 instance. These credentials granted them access to sensitive S3 buckets and other resources within the company's production environment, demonstrating a clear path from a misconfigured training app to a significant data breach.
The consequences of this misconfiguration are severe:
cryptojacking can be substantial, along with the costs of incident response and remediation.sts:AssumeRole or s3:ListBuckets from an unexpected source.User Behavior Analysis principles to look for anomalous usage of IAM credentials, especially those associated with EC2 instances running these applications.M1048 - Application Isolation and Sandboxing.M1030 - Network Segmentation).Ensure that training applications are run in isolated environments (sandboxes, dedicated cloud accounts) with no connectivity to production systems or credentials.
Mapped D3FEND Techniques:
Use strict network policies to logically separate training environments from all other corporate network segments.
Mapped D3FEND Techniques:
Implement and enforce secure configuration policies that forbid the deployment of non-production, insecure applications within production environments.
Mapped D3FEND Techniques:
The fundamental mitigation for this threat is strict network isolation. Security training applications like OWASP Juice Shop or DVWA must never share a network environment with production systems. Organizations should establish a dedicated 'sandbox' VPC or cloud account for all security training activities. This environment must have a default-deny network policy, with no network path to any production or corporate resources. Furthermore, it should have highly restrictive egress filtering to prevent any compromised instance from calling out to the internet for C2 or exfiltration. By treating the training environment as inherently hostile and untrusted, organizations can prevent attackers from using it as a pivot point into valuable networks.
While the name is specific, the principle of monitoring cloud service interactions is key. Use Cloud Security Posture Management (CSPM) and Cloud-Native Application Protection Platform (CNAPP) tools to continuously scan for misconfigured deployments. These tools can identify public-facing instances running known-vulnerable applications and check for dangerous configurations, such as having production IAM roles attached. Create automated alerts that trigger when an EC2 instance or container is deployed with a tag like 'training' or 'test' but is also assigned a role with production access or is located in a production network segment. This automated oversight is essential for preventing the manual errors that lead to this type of breach.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats