More

    Red Hat hackers Crimson Collective are now going after AWS instances




    • Crimson Collective hackers target AWS using exposed credentials to escalate privileges and exfiltrate data
    • Attackers use TruffleHog to find secrets, then create IAM users and access keys via API
    • Red Hat breach yielded 570GB of sensitive files, including 800 infrastructure-rich consulting records

    Crimson Collective, the threat actor behind the recent breach at Red Hat, is now going after Amazon Web Services (AWS) cloud environments, looking to establish persistence, steal data, and extort the victims for money.

    Cybersecurity researchers Rapid7 found the attackers are using TruffleHog, an open source security tool designed to search for secrets, credentials, and API keys that may have been accidentally exposed in code repositories or other sources. After finding exposed AWS credentials, the attackers create new IAM users and login profiles via API calls, and create new access keys, as well as escalating privileges by attaching new policies.

    https://cdn.mos.cms.futurecdn.net/ioiGboNmGxjo77hGKRFefJ-1980-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    spot_imgspot_img