Most cloud intrusions in 2025 did not start with an exotic exploit. They started where on-premises identity meets cloud identity. Industry threat-intelligence research published in early 2026 found that the majority of cloud compromises stemmed from weaknesses in identity controls, workload configuration, and hybrid-cloud integration — not zero-days (Dark Reading). That single finding rewrites the hybrid defender's priorities. The work is not patching faster than attackers can weaponize CVEs. The work is watching the bridge between your on-prem Active Directory and your cloud tenant, because that is the surface attackers actually pivot through.
This guide explains what hybrid cloud threat detection is, how it works at the level of east-west traffic, identity events, and workload telemetry, and which specific MITRE ATT&CK techniques small SOC teams should be ready to detect today. It maps the canonical hybrid attack patterns — Storm-0501's evolution to cloud-based ransomware, ShinyHunters' OAuth-token identity bridges into Snowflake — to telemetry sources you can actually collect. It compares NDR, CDR, CNAPP, ITDR, and XDR for hybrid coverage so you can rationalize five overlapping acronyms into a defensible buying decision. And it crosswalks the result to NIS2, DORA, and NIST CSF 2.0.
Hybrid cloud threat detection is the practice of identifying and investigating attacker activity that spans on-premises infrastructure and one or more public cloud environments, with particular focus on the identity, network, and workload signals that cross the on-prem to cloud bridge. It treats the bridge — not the perimeter — as the primary attack surface.
The reframing matters because the data has shifted. According to Ponemon Institute's Cost of a Data Breach study (2025), breaches involving multiple environments — the hybrid configuration — averaged $5.05M, the highest of any environment category and roughly 25% above on-premises-only breaches (coverage on Dark Reading). And in a 2025 hybrid cloud security survey of 1,021 security and IT leaders, 55% of respondents said their organizations had experienced a breach in the past year, up significantly year-over-year. Attackers are not finding hybrid environments hard. Defenders are.
Why hybrid is uniquely hard comes down to signal silos. On-prem teams run a SIEM that ingests Active Directory and firewall logs. Cloud teams collect cloud-native audit logs in a separate console. Identity teams watch Entra ID sign-ins. Network teams watch east-west traffic — when they can see it. None of those tools, on their own, sees the full timeline of a hybrid attack. Hybrid cloud threat detection is the discipline of stitching them together.
This is distinct from cloud-only detection (CDR), which scopes itself to cloud workloads and the cloud control plane, and from traditional on-prem-only detection, which stops at the perimeter. It complements the broader hybrid cloud security and cloud security disciplines, but its specific job is the detect function across the bridge.
At a process level, hybrid cloud threat detection follows eight repeatable steps:
Three signal sources do most of the work: east-west network traffic, identity events that cross the Entra ID and on-prem AD bridge, and workload telemetry across both sides. The technical mechanics live underneath each one.
North-south traffic crosses a network perimeter. East-west traffic moves laterally between systems — server to server, VM to VM, container to container. Perimeter tools see north-south. They are blind to east-west by design. That blindness is where attackers hide lateral movement.
Closing the gap means placing sensors where east-west actually flows. On-prem, that is TAPs and SPAN ports at network aggregation points. In cloud, that is VPC traffic mirroring on AWS, virtual TAPs on Azure, and packet mirroring on GCP. The output is network metadata — connection records, protocol headers, JA3/JA4 fingerprints — not full packet captures. Metadata is cheap to retain and rich enough for behavioral analysis.
Encryption is the next obstacle. Industry-cited figures put encrypted enterprise traffic at over 80%, and the trend is one-way. Decrypting east-west at scale is a non-starter for most teams — too expensive, too risky, often too noisy. The modern approach treats encrypted traffic as a feature set rather than an obstacle. JA3 and the newer JA4 family fingerprint TLS clients from handshake parameters. Encrypted Traffic Analytics (ETA) layers behavioral metadata — packet sizes, timing, sequence patterns — on top. Together, they let defenders identify, for example, Cobalt Strike beaconing by its consistent TLS fingerprint and beacon cadence, without ever terminating the TLS session. In the same 2025 hybrid cloud security survey of 1,021 security and IT leaders, 89% of respondents called deep observability — combining logs, metrics, and packet metadata — fundamental to their security strategy.
Hybrid identity is a sliding glass door. From the inside, it looks like one room — users sign in once, claims flow through, resources unlock on either side. From the attacker's side, that single door is the most valuable surface in the environment. Compromise the door, and you control both rooms.
The architectural variants matter because each one creates different detection signals. Password Hash Sync (PHS) replicates password hashes from on-prem AD into Entra ID. Pass-Through Authentication (PTA) keeps verification on-prem and uses a lightweight agent in the cloud. AD FS federation hands authentication to an on-prem Federation Service. The common thread across all three is a server — Entra Connect (formerly Azure AD Connect) — that holds the keys.
That server is the canonical hybrid attack target. The high-fidelity detection signals defenders should build around it include Global Admin sign-ins originating from a hybrid-joined server, Directory Synchronization Account (DSA) credential extraction events outside scheduled sync windows, and the insertion of a malicious federated domain into the tenant. Behavioral analytics on identity logs surfaces these patterns reliably; raw log review rarely does.
The third signal source is workload. On-prem, that means hypervisor and process telemetry from EDR. In cloud, it means runtime sensors and audit logs from the cloud provider. The point of collecting both is correlation — a weak signal in identity logs becomes a high-fidelity incident when paired with a matching network signal and a matching workload event in the same time window.
Two named threat actors anchor the modern hybrid threat narrative — Storm-0501 and ShinyHunters. Both pivoted through the identity bridge. Both are now patterns, not one-offs.
Storm-0501 is the canonical hybrid kill chain. As documented by MSTIC and reported in BleepingComputer and Dark Reading, the actor traverses Active Directory, moves laterally with Evil-WinRM (PowerShell-over-WinRM post-exploitation), compromises an Entra Connect Sync server, extracts the Directory Synchronization Account credentials, signs into the cloud as Global Admin from a hybrid-joined server, then pivots to cloud-native ransomware. The 2025 evolution added cloud-native data exfiltration from Azure Storage, deletion of Recovery Services vaults, and re-encryption of cloud data with attacker-controlled Key Vault keys — ransomware without traditional malware. Additional reporting on the underlying credential hygiene problem appears in Dark Reading's coverage of sloppy Entra ID credentials in hybrid cloud ransomware.
ShinyHunters — collaborating with Scattered Spider / The Com on social engineering — used a different bridge. Rather than compromise an identity sync server, the actor compromised SaaS integrators (Anodot in April 2026; Vercel and Context AI in April 2026) to harvest long-lived OAuth tokens, then used those tokens as identity bridges into downstream tenants (The Hacker News — ShinyHunters tag; Vercel / Context AI breach coverage; ShinyHunters / Scattered Spider collaboration). MFA on the downstream tenant did not help, because the attacker authenticated with a valid OAuth grant the user had already approved.
A third pattern showed up at the protocol level. CVE-2025-53786 (CVSS 8.0) allowed post-authentication privilege escalation from on-prem Exchange admin to Exchange Online via shared service principal abuse. CISA published an alert and issued Emergency Directive 25-02 mandating mitigation by 2025-08-11. The hybrid integration layer itself is now an active vulnerability target.
Mandiant M-Trends 2026 puts numbers on the trend: 32% of 2025 intrusions began with exploits, the median dwell time is 14 days, and the mean time to exploit is now -7 days — meaning exploitation often precedes patch release. That shifts the burden onto detection.
The table below maps the techniques most relevant to hybrid detection — from technique ID to the telemetry source where the signal actually lives, and to a sample detection rule a small team can write this quarter. Mapping detections to ATT&CK is the throughline that makes the rest of the program defensible across audits and reviews; the cyber kill chain gives you the narrative arc, ATT&CK gives you the identifiers.
The full MITRE ATT&CK Cloud Matrix is the canonical source — start here, expand as coverage matures.
Five overlapping acronyms cover hybrid detection from different angles. A CIO/CISO with under five security FTEs cannot rationalize all five into a procurement plan without a single decision matrix. The matrix below is that.
The unsettled debate is between CNAPP and CDR. CNAPP-platform vendors argue their platform now includes runtime CDR. Standalone CDR vendors argue CNAPP is fundamentally preventative — posture and configuration — and that runtime detection is a different muscle. The practical answer is that most enterprises need both functions; whether they buy them as one product or two is a buying-cycle question, not a capability question.
For a hybrid environment specifically, the minimum viable coverage is usually two of the five: NDR (for the bridge and east-west) plus ITDR (for identity-led attacks). CDR enters when cloud workloads dominate the estate. XDR enters when the team is already running multiple feeds and needs aggregation. The classic SOC triad — network, endpoint, log — is a useful baseline; for hybrid, identity needs to be the fourth leg. In the same 2025 hybrid cloud security survey, 70% of respondents named public cloud as the greatest risk in their environment, which is consistent with that prioritization.
This is also why the broader category of hybrid threat detection is rarely solved by a single product — it is solved by a small set of well-integrated ones.
Two real-world incidents teach the pattern more clearly than any abstract framework.
In 2024, ShinyHunters-affiliated actors used credentials harvested from historical infostealer infections — some dating back to 2020 — to access roughly 165 organizations including AT&T, Ticketmaster/Live Nation, Santander, LendingTree, Advance Auto Parts, and Neiman Marcus. The Cloud Security Alliance's retrospective put the diagnostic numbers on the table: more than 80% of compromised accounts had prior credential exposure, and impacted accounts lacked multi-factor authentication. The credential theft was old. The detection gap was that nobody was watching for old-credential reuse against new geographies and new devices.
The 2026 evolution sharpened the pattern. Attackers compromised the SaaS integrator Anodot, harvested OAuth tokens, and used those tokens as long-lived identity bridges into downstream tenants — including Snowflake — without exploiting Snowflake itself. The Vercel/Context AI breach in April 2026 followed the same template. This is a supply chain attack executed at the identity layer, and the defender takeaway is concrete: hybrid detection must include OAuth grants to integrator service principals, followed by anomalous source-IP usage, followed by non-interactive authentication from new devices. Without those three signals stitched together, account takeover via OAuth bridge is invisible.
Storm-0501's kill chain reads, end to end: initial AD foothold, Evil-WinRM lateral movement, DSA credential extraction from Entra Connect Sync, Global Admin sign-in from a hybrid-joined Windows server, Recovery Services vault deletion, and cloud-side re-encryption via an attacker-controlled Key Vault. Each stage is a detection opportunity. The single highest-fidelity signal most defenders missed: a Global Admin sign-in originating from a hybrid-joined Windows server is unusual and should fire a high-severity alert. Microsoft has since restricted Directory Synchronization Account permissions in Entra Connect Sync and Cloud Sync — a defensive change defenders can rely on, but not the only one they should make.
For a small SOC team — under five FTEs, hybrid environment, regulated industry — a workable rollout is seven steps:
T1556.007, T1078.004, T1021.006, T1550, T1098.005). Expand outward as coverage matures.The 55% breach rate from the same 2025 hybrid cloud security survey of 1,021 security and IT leaders is worth keeping in front of executive sponsors — the baseline likelihood of a breach is now high enough that detection investment is, by any honest reading, a controllable cost. Ponemon Institute's Cost of a Data Breach study (2025) puts the average multi-environment breach at $5.05M. Detection spend is small compared to that ledger.
Detection capability maps cleanly onto regulatory obligation. The crosswalk below covers the four frameworks regulated ICP industries — financial services, healthcare, manufacturing — most often face. This is the mapping, not compliance advice.
Geographic specifics matter. EU financial entities under DORA face a 4-hour incident-reporting clock from the moment an event qualifies as a major ICT-related incident. In Germany, the NIS2 BSI registration deadline of 2026-03-06 saw approximately 33% compliance, suggesting many essential and important entities are still building toward documented detection capabilities. The security frameworks themselves do not prescribe vendors — they prescribe outcomes a defensible detection program can demonstrate.
The category is evolving on three fronts.
AI-driven cross-domain correlation is consolidating the analyst workflow. Rather than three handoffs between identity, network, and cloud teams, modern detection platforms stitch the three signal domains into a single attack graph and surface a prioritized incident with the on-prem and cloud halves already linked. The methodology is what matters more than the marketing label — AI threat detection is a means to faster, cleaner attacker behavior analysis, not an end in itself.
Encrypted east-west analysis without decryption is now table stakes. JA3/JA4 fingerprinting and Encrypted Traffic Analytics treat encrypted traffic as a feature set to model rather than an obstacle to remove. The defensive math is simpler than it sounds: malware beacons rarely vary their TLS fingerprint, and behavioral metadata (packet sizes, flow timing) is a stable signature even when payloads are unreadable.
Active resilience is the third front. Mandiant M-Trends 2026 highlights the "Recovery Denial" tactic — attackers explicitly target backup infrastructure to deny recovery and force ransom payment (Mandiant M-Trends 2026). Google Cloud's Threat Horizons reporting for H1 2026 notes 48-hour mass exploitation timelines on managed Kubernetes. The defensive consequence is that immutable backups, cloud-native key-vault hardening, and runbooks that assume attackers have already deleted recovery points are no longer optional.
Vectra AI's Attack Signal Intelligence treats the modern network — on-prem, cloud, identity, SaaS, and IoT/OT — as one unified attack surface. The methodology is simple to state: assume compromise; prioritize signal over noise; surface the few behaviors that matter when an attacker bridges the on-prem to cloud gap. The work is in the math and the labels behind the scenes, but for the analyst it shows up as a clear, prioritized incident with the on-prem and cloud halves already stitched together — exactly the timeline a Storm-0501 or ShinyHunters investigation requires.
Hybrid cloud threat detection is no longer an optional sub-discipline of cloud security. The data points all run the same direction: hybrid breaches are now the most expensive category, the majority of cloud intrusions exploit identity controls rather than zero-days, and the canonical 2024-2026 attack patterns — Storm-0501's evolution to cloud-based ransomware, ShinyHunters' OAuth-token bridges into Snowflake — both pivot through the on-prem to cloud bridge.
The good news is that the defender's playbook is concrete. Inventory the bridge. Add east-west sensors at on-prem aggregation points and cloud VPC mirrors. Tune identity correlations across Entra ID and on-prem AD. Map detections to the MITRE ATT&CK Cloud Matrix techniques that adversaries actually use against hybrid environments. Write three high-fidelity rules — Global Admin sign-in from a hybrid-joined server, DSA credential read outside sync windows, OAuth grant followed by unfamiliar source-IP activity — and stitch the resulting incidents into a unified timeline. None of this requires a sprawling team or an unbounded budget. It requires the discipline to treat the bridge as the attack surface it has become.
For deeper architecture context, the hybrid cloud security cluster is the next read, and the network detection and response, identity threat detection and response, and MITRE ATT&CK topic pages provide the underpinning concepts each of the seven implementation steps draws on. The cyber resilience and zero trust frameworks tie these capabilities back to executive-level outcomes.
Hybrid cloud threat detection is the practice of identifying attacker activity that spans on-premises infrastructure and one or more public cloud environments, with focus on the identity, network, and workload signals that cross the on-prem to cloud bridge. It treats the bridge — identity sync servers, federation, east-west traffic between environments — as the primary attack surface rather than the perimeter. The discipline emerged because traditional perimeter and endpoint tools systematically miss the moments where attackers pivot between on-prem and cloud, and because most modern intrusions exploit identity controls and hybrid integration rather than zero-days. A hybrid threat detection program collects telemetry from network, identity, and workload sources on both sides of the bridge, baselines normal behavior per device and identity, and surfaces anomalies that no single domain would have flagged alone.
Cloud-only detection — typically delivered as Cloud Detection and Response (CDR) — covers cloud-native control plane and workloads. It watches cloud audit logs, runtime sensors, and configuration drift inside cloud environments. Hybrid cloud threat detection adds the on-prem to cloud bridge: the identity sync layer (Entra Connect Sync), federation services (AD FS), east-west traffic between on-prem and cloud, and OAuth grants to SaaS integrators that act as identity bridges. That bridge is where Storm-0501 actually pivots, and where ShinyHunters' OAuth-token campaigns into Snowflake actually land. CDR alone misses the on-prem half of these timelines; on-prem-only NDR or SIEM misses the cloud half. Hybrid detection is the discipline of stitching both halves into one investigation. For most regulated enterprises, cloud-only is necessary but not sufficient.
According to Ponemon Institute's Cost of a Data Breach study (2025), data breaches involving multiple environments — the hybrid configuration — averaged $5.05M, the highest of any environment category (coverage on Dark Reading). For comparison, private cloud averaged $4.68M, public cloud $4.18M, and on-premises-only $4.01M. The hybrid premium reflects the operational reality that multi-environment breaches take longer to detect and longer to contain, because investigators have to stitch together identity, network, and workload telemetry from systems that rarely share a common console. The cost differential alone is a defensible argument for investing in detection capability that spans the bridge rather than treating the bridge as someone else's problem.
SIEM aggregates logs across on-prem and cloud sources and runs correlation rules. It is necessary but not sufficient for hybrid cloud detection. Modern hybrid detection layers two specialized capabilities on top of the SIEM. NDR adds east-west visibility and behavioral analysis of network metadata that SIEM rules cannot extract from logs alone — particularly for encrypted traffic, where JA3/JA4 fingerprinting and behavioral metadata are required. ITDR adds identity-bridge attack detection that depends on stitching Entra ID and on-prem AD events with sub-minute precision and behavioral baselines per identity. SIEM remains the long-term log retention layer and the compliance-evidence store, but in a 2025 environment where over 80% of enterprise traffic is encrypted, treating the SIEM as the entire detection program leaves predictable hybrid attack patterns invisible.
Deep observability — combining logs, metrics, and network packets or metadata — gives defenders ground truth that logs alone cannot. Logs are produced by systems describing themselves; network telemetry is produced by systems' actual behavior. When the two disagree (because an attacker has tampered with logging, disabled an agent, or moved over an encrypted channel that the log layer never sees), packet metadata is the source of truth. In a 2025 hybrid cloud security survey of 1,021 security and IT leaders, 89% called deep observability fundamental to their hybrid security strategy, and 83% said it had become a board-level discussion. The practical implication for hybrid is that east-west network metadata, including JA3/JA4 fingerprints and behavioral flow features, must be a first-class telemetry source — not an afterthought to log-centric architectures.