An attacker was able to gain access to a cloud environment due to a lack of security controls in place. Once he gained access to that environment, he used those resources to perform a distributed denial of service attack against another organization. What is this type of threat known as?