“InfoSecCon-2025” was successfully held with tremendous audiences with various time demanding topics and keynotes at …
Read More »Abusing AWS features: Ransomware Encrypting S3 Buckets
Executive Summary: Native Resource Abuse: Threat actor dubbed Codefinger uses compromised AWS keys to encrypt S3 bucket data via SSE-C, leveraging AWS’s secure encryption infrastructure in a way that prevents recovery without their generated key. Irrecoverable Data Loss: AWS CloudTrail logs only an HMAC of the encryption key, which is …
Read More »