Security researcher Ionuț Cernica revealed how commonplace Linux utilities can be weaponized to siphon sensitive data in multi-tenant environments.
His talk, “Silent Leaks: Harvesting Secrets from Shared Linux Environments,” exposed that without any root privileges or zero-day exploits, attackers can exploit standard tools—such as ps, /proc, and temporary file handling—to harvest database credentials, API keys, and user secrets in plain sight.
https://gbhackers.com/legitimate-system ... exploited/