AWS S3 feature exploited by ransomware hackers to encrypt storage buckets


  • Attackers gain access to storage buckets with exposed AWS keys
  • The files are then encrypted and scheduled for deletion after one week
  • Halycon says it observed at least two victims being attacked this way

Cybercriminals have begun exploiting legitimate AWS S3 capabilities to encrypt victim buckets in a unique twist to the old ransomware attack.

Researchers from Halycon have recently observed several victims, all AWS native software developers, being attacked in this way. In the attack, the group, called Codefinger, gained access to their victims’ cloud storage locations through publicly exposed or otherwise compromised AWS keys with read and write permissions.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top