thumbnail Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments