This is a great blog by @megan on ransomware/data extortion in the cloud, including TTPs and a link to a recent podcast
After obtaining the correct permissions required to carry out their attack, the threat actor will then perform reconnaissance in the environment to identify the data they will exfiltrate and use to ransom the victim. ... Assuming they have the right permissions, direct access via the console, simple CLI commands, or API calls can be used to interact with [cloud] storage.
