Blog
Share This Post
[ad_1]

Amazon Web Services customers had over 2 TB of credentials, source code, and other account secrets across several platforms exfiltrated as part of an ongoing attack campaign believed to be conducted by the ShinyHunters and Nemesis cybercrime operations, which has been exposed by a misconfigured S3 bucket, The Register reports.
Attacks conducted by the threat actors since March involved the exploitation of numerous open-source tools and scripts to discover AWS’s 26.8 million IP addresses, whose domain addresses were later obtained through a Shodan search, an analysis by cybersecurity researchers Noam Rotem and Ran Locar published on vpnMentor showed. Further SSL certificate analysis was then followed by exposed generic endpoint scanning, which facilitated the compromise of AWS customer credentials and other sensitive data. “During our investigation, we found not only the code and software tools used to run the operation, but also some of the stolen data itself, including thousands of keys and secrets. There were also files listing tens of thousands of vulnerable targets all over the world as well as all the necessary information to access their data or use their resources for other purposes,” said researchers. Despite the massive data exposure, AWS has not regarded the development to stem from an issue that requires fixing from its end.
Get essential knowledge and practical strategies to fortify your identity security.
[ad_2]
Source link
Subscribe To Our Newsletter
Get updates and learn from the best
More To Explore
US Charges Five People Over North Korean IT Worker Scheme
[ad_1] The US has announced charges against five individuals involved in a fake IT workers scheme to funnel funds to
In Other News: VPN Supply Chain Attack, PayPal $2M Settlement, RAT Builder Hacks Script Kiddies
[ad_1] Noteworthy stories that might have slipped under the radar: Korean VPN supply chain attack, PayPal settles with New York