Attackers access storage buckets with exposed AWS keys The files are then encrypted and scheduled for deletion after a week Halycon says it observed at least two victims being attacked this way ...
Amazon is urging its customers to deploy additional security measures to secure S3 buckets following reports of ransomware ...
The Codefinger ransomware represents a new frontier in cyber threats, specifically targeting AWS S3 buckets. By exploiting ...
A current ransomware campaign is targeting data dumps in Amazon S3 buckets. The attackers are using "Server-Side Encryption with Customer Provided Keys" (SSE-C), i.e. server-side encryption with ...
A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the ...
After accessing the buckets, they would use AWS server-side encryption with customer provided ... also using AWS S3 native features. Speaking to The Register, VP of services with the Halcyon ...
A new ransomware crew dubbed Codefinger targets AWS S3 buckets and uses the cloud giant's own server-side encryption with customer provided keys (SSE-C) to lock up victims' data before demanding a ...
it could pose a systemic threat to organizations using Amazon S3 for critical data storage,” the report adds. The attacker leverages AWS’s Server-Side Encryption with Customer Provided Keys ...