With a festive look and the participation of more than one hundred participants from Bangladesh …
Read More »Abusing AWS features: Ransomware Encrypting S3 Buckets
Executive Summary: Native Resource Abuse: Threat actor dubbed Codefinger uses compromised AWS keys to encrypt S3 bucket data via SSE-C, leveraging AWS’s secure encryption infrastructure in a way that prevents recovery without their generated key. Irrecoverable Data Loss: AWS CloudTrail logs only an HMAC of the encryption key, which is …
Read More »