This Week in Security: The UK Wants Your iCloud, Libarchive Wasn’t Ready, and AWS

There’s a constant tension between governments looking for easier ways to catch criminals, companies looking to actually protect their users’ privacy, and individuals who just want their data to be …read more Continue reading This Week in Security: The UK Wants Your iCloud, Libarchive Wasn’t Ready, and AWS

Abandoned Amazon S3 Buckets Enabled Attacks Against Governments, Big Firms

150 abandoned Amazon S3 buckets could have been leveraged to deliver malware or backdoors to governments and Fortune companies.
The post Abandoned Amazon S3 Buckets Enabled Attacks Against Governments, Big Firms appeared first on SecurityWeek.
Continue reading Abandoned Amazon S3 Buckets Enabled Attacks Against Governments, Big Firms

FUNNULL Unmasked: AWS, Azure Abused for Global Cybercrime Operations

Discover how cybercriminals use ‘Infrastructure Laundering’ to exploit AWS and Azure for scams, phishing, and money laundering. Learn about FUNNULL CDN’s tactics and their global impact on businesses and cybersecurity. Continue reading FUNNULL Unmasked: AWS, Azure Abused for Global Cybercrime Operations

Attackers are encrypting AWS S3 data without using ransomware

A ransomware gang dubbed Codefinger is encrypting data stored in target organizations’ AWS S3 buckets with AWS’s server-side encryption option with customer-provided keys (SSE-C), and asking for money to hand over the key they used. They do not e… Continue reading Attackers are encrypting AWS S3 data without using ransomware

The shocking speed of AWS key exploitation

It’s no secret that developers often inadvertently expose AWS access keys online and we know that these keys are being scraped and misused by attackers before organizations get a chance to revoke them. Clutch Security researchers performed a test… Continue reading The shocking speed of AWS key exploitation