In the cat and mouse game of protecting cloud services, attackers find a sneaky advantage.