AWS S3 feature exploited by ransomware hackers to encrypt storage buckets




  • Attackers access storage buckets with exposed AWS keys
  • The files are then encrypted and scheduled for deletion after a week
  • Halycon says it observed at least two victims being attacked this way

Cybercriminals have started exploiting legitimate AWS S3 features to encrypt victim buckets in a unique twist to the old ransomware attack.

Researchers from Halycon recently observed multiple victims, all AWS native software developers, being attacked this way. In the attack, the group, dubbed Codefinger, accessed their victims’ cloud storage buckets through publicly exposed, or otherwise compromised, AWS keys with read and write permissions.

https://cdn.mos.cms.futurecdn.net/wEXMiPzVwyFScr9dUD6V9B-1200-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img