Compromised AWS Keys Abused in Codefinger Ransomware Attacks
https://www.securityweek.com/compromised-aws-keys-abused-in-codefinger-ransomware-attacks/
#Infosec #Security #Cybersecurity #CeptBiro #AWSKeys #Codefinger #RansomwareAttacks
New Amazon Ransomware Attack—‘Recovery Impossible’ Without Payment
A new ransomware threat, known as Codefinger, targeting users of Amazon Web Services S3 buckets, has now been confirmed.
#AWS #amazon #S3 #codefinger #ransomware #malware #security #cybersecurity #hackers #hacking #hacked
🚨 The new #Codefinger ransomware group is exploiting AWS's SSE-C to encrypt S3 buckets, using security features against users. Protect your credentials and enable 2FA! 🔐
🔗https://hackread.com/codefinger-ransomware-amazon-aws-encrypt-s3-buckets/
🚨 The new #Codefinger ransomware group is exploiting AWS's SSE-C to encrypt S3 buckets, using security features against users. Protect your credentials and enable 2FA! 🔐
🔗https://hackread.com/codefinger-ransomware-amazon-aws-encrypt-s3-buckets/
#Ransomware threat actors are increasingly abusing AWS's Server-Side Encryption (SSE-C) to encrypt S3 buckets without needing to drop malware. Most recently a TA known as #Codefinger is using this technique.
🕵 Make sure you're monitoring S3 and encryption activity via CloudTrail & GuardDuty.
https://www.halcyon.ai/blog/abusing-aws-native-services-ransomware-encrypting-s3-buckets-with-sse-c