More

    AWS S3 feature exploited by ransomware hackers to encrypt storage buckets




    • Attackers access storage buckets with exposed AWS keys
    • The files are then encrypted and scheduled for deletion after a week
    • Halycon says it observed at least two victims being attacked this way

    Cybercriminals have started exploiting legitimate AWS S3 features to encrypt victim buckets in a unique twist to the old ransomware attack.

    Researchers from Halycon recently observed multiple victims, all AWS native software developers, being attacked this way. In the attack, the group, dubbed Codefinger, accessed their victims’ cloud storage buckets through publicly exposed, or otherwise compromised, AWS keys with read and write permissions.

    https://cdn.mos.cms.futurecdn.net/wEXMiPzVwyFScr9dUD6V9B-1200-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img