This is not about hacking the cloud. Instead this is about using the cloud to hack
Some articles last year wrote on how hackers used Amazon Ec2 for hacking/ddos attacks.
Roth claims that a typical wireless password can be guessed by EC2 and his software in about six minutes. He proved this by hacking networks in the area where he lives. The type of EC2 computers used in the attack costs 28 cents per minute, so $1.68 is all it could take to lay open a wireless network.
and
Cloud services are also attractive for hackers because the use of multiple servers can facilitate tasks such as cracking passwords, said Ray Valdes, an analyst at Gartner Inc. Amazon could improve measures to weed out bogus accounts, he said.
and this article by Anti-Sec pointed out how one can obtain a debit card anonymously
https://www.facebook.com/notes/lulzsec/want-to-be-a-ghost-on-the-internet/230293097062823
VPN Account without paper trail
- Purchase prepaid visa card with cash
- Purchase Bitcoins with Money Order
- Donate Bitcoins to different account
Masking your IP address to log on is done by TOR
https://www.torproject.org/download/download.html.en
and the actual flooding is done by tools like LOIC or HOIC
http://sourceforge.net/projects/loic/
and
http://www.4shared.com/rar/UmCu0ds1/hoic.html
So what safeguards can be expected from the next wave of Teenage Mutant Ninjas..?