Red Hat Hackers Crimson Collective now goes after AWS occurrences


  • Crimson -Collective hackers are targeting AWS using exposed credentials to escalate privileges and exfiltrate data
  • Attackers use Trufflehog to find secrets, then create IAM users and access keys via API
  • Red Hat Overlay provided 570 GB of sensitive files, including 800 infrastructure-rich consultant registers

Crimson Collective, the threat actor behind the recent violation of Red Hat, now goes after Amazon Web Services (AWS) Sky environments who want to establish persistence, steal data and pressure the victims of money.

CyberSecurity scientists RAPID7 found that attackers are using Trufflehog, an open source security tool designed to search for secrets, credentials and API keys that may have been accidentally exposed to codepositories or other sources. After finding exposed AWS legitimation information, attackers create new IAM users and login profiles via API calls and create new access keys as well as escalating privileges by linking new policies.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top