Red Hat hackers Crimson Collective are now going after AWS instances




  • Crimson Collective hackers target AWS using exposed credentials to escalate privileges and exfiltrate data
  • Attackers use TruffleHog to find secrets, then create IAM users and access keys via API
  • Red Hat breach yielded 570GB of sensitive files, including 800 infrastructure-rich consulting records

Crimson Collective, the threat actor behind the recent breach at Red Hat, is now going after Amazon Web Services (AWS) cloud environments, looking to establish persistence, steal data, and extort the victims for money.

Cybersecurity researchers Rapid7 found the attackers are using TruffleHog, an open source security tool designed to search for secrets, credentials, and API keys that may have been accidentally exposed in code repositories or other sources. After finding exposed AWS credentials, the attackers create new IAM users and login profiles via API calls, and create new access keys, as well as escalating privileges by attaching new policies.

https://cdn.mos.cms.futurecdn.net/ioiGboNmGxjo77hGKRFefJ-1980-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img