When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

That can give them a cloud identity access key - and thus a way into the Azure VM.

The final step in the attack is removing any traces of it ever happening.

Digital clouds against a blue background.

ViaBleepingComputer

More from TechRadar Pro