AWS S3 feature exploited by ransomware hackers to encrypt storage buckets


  • Attackers access storage buckets with exposed AWS keys
  • The files are then encrypted and scheduled to be deleted after a week
  • Halycon says it observed at least two victims attacked in this way

Cybercriminals have begun exploiting legitimate AWS S3 features to encrypt victims’ buckets, a unique twist on the old ransomware attack.

Halycon researchers recently observed several victims, all AWS native software developers, being attacked in this manner. In the attack, the group, dubbed Codefinger, accessed its victims’ cloud storage buckets via publicly exposed or otherwise compromised AWS keys with read and write permissions.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top