Navigation
Recherche
|
Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days
mardi 14 janvier 2025, 11:00 , par Slashdot
Codefinger also leaves a ransom note in each affected directory that includes the attacker's Bitcoin address and a client ID associated with the encrypted data. 'The note warns that changes to account permissions or files will end negotiations,' the Halcyon researchers said in a report about S3 bucket attacks shared with The Register. While West declined to name or provide any additional details about the two Codefinger victims -- including if they paid the ransom demands -- he suggests that AWS customers restrict the use of SSE-C. 'This can be achieved by leveraging the Condition element in IAM policies to prevent unauthorized applications of SSE-C on S3 buckets, ensuring that only approved data and users can utilize this feature,' he explained. Plus, it's important to monitor and regularly audit AWS keys, as these make very attractive targets for all types of criminals looking to break into companies' cloud environments and steal data. 'Permissions should be reviewed frequently to confirm they align with the principle of least privilege, while unused keys should be disabled, and active ones rotated regularly to minimize exposure,' West said. An AWS spokesperson said it notifies affected customers of exposed keys and 'quickly takes any necessary actions, such as applying quarantine policies to minimize risks for customers without disrupting their IT environment.' They also directed users to this post about what to do upon noticing unauthorized activity. Read more of this story at Slashdot.
https://it.slashdot.org/story/25/01/14/0141238/ransomware-crew-abuses-aws-native-encryption-sets-dat...
Voir aussi |
56 sources (32 en français)
Date Actuelle
mer. 15 janv. - 09:36 CET
|