NEW: Unlock the Future of Finance with CRYPTO ENDEVR - Explore, Invest, and Prosper in Crypto!
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
No Result
View All Result

Act fast to blunt a new ransomware attack on AWS S3 buckets

Act fast to blunt a new ransomware attack on AWS S3 buckets
Share on FacebookShare on Twitter

Ransomware Attack Utilizes AWS Server-Side Encryption to Demand Ransom Payments

New Use of SSE-C by Ransomware Operators

The attacker leverages AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C) to encrypt data, demanding ransom payments if the victim firm wants the symmetric AES-256 keys required for decryption. While SSE-C has been available since 2014, say the researchers, this appears to be a novel use of the feature by ransomware operators.

Encryption and Threats

The encrypted files are marked for deletion within seven days, adding pressure on the victims to pay the ransom.

How Stolen AWS Keys are Obtained

The report doesn’t detail how the stolen AWS keys are obtained. However, in response to emailed questions, Halcyon said keys can be exposed in a variety of ways, including through compromised IT networks and phishing. Keys often get leaked publicly by developers or employees who embed them in code repos such as GitHub or GitLab.

Conclusion

The use of AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C) by ransomware operators is a new and significant trend in the world of cyber attacks. The pressure to pay the ransom is further amplified by the threat of data deletion, making it essential for organizations to take immediate action to protect themselves against such attacks.

FAQs

  • What is AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C)? SSE-C is a feature available on AWS since 2014 that allows customers to encrypt their data using their own encryption keys.
  • How do attackers obtain the stolen AWS keys? The report does not detail the exact methods used by attackers to obtain the stolen AWS keys, but Halcyon suggests that they can be exposed through compromised IT networks, phishing, and publicly leaked keys.
  • What is the impact of the ransomware attack? The ransomware attack encrypts the victim’s files and demands a ransom payment in exchange for the decryption keys. The files are marked for deletion within seven days, adding pressure on the victims to pay the ransom.
  • What can organizations do to protect themselves against such attacks? Organizations should take immediate action to protect themselves against such attacks by implementing robust security measures, including encryption, access controls, and monitoring systems.
cryptoendevr

cryptoendevr

Related Stories

Russian APT28 compromised Western logistics and IT firms to track aid to Ukraine

Russian APT28 compromised Western logistics and IT firms to track aid to Ukraine

May 22, 2025
0

Rewrite the Intelligence and cybersecurity agencies from 10 countries has warned in a joint advisory that a cyberespionage group operated...

Prompt injection flaws in GitLab Duo highlights risks in AI assistants

Prompt injection flaws in GitLab Duo highlights risks in AI assistants

May 22, 2025
0

Rewrite the Developer companion turned against the developer GitLab Duo is an AI-powered development lifecycle companion for the popular GitLab...

Samlify bug lets attackers bypass single sign-on

Samlify bug lets attackers bypass single sign-on

May 22, 2025
0

Rewrite the The attackers then insert a second, fake assertion–claiming to be an admin–into the already obtained, signed XML snippet....

Feds and Microsoft crush Lumma Stealer that stole millions of passwords

Feds and Microsoft crush Lumma Stealer that stole millions of passwords

May 22, 2025
0

Rewrite the A global strike on a malware-as-a-service giant LummaC2, also known simply as Lumma, is a sophisticated Malware-as-a-Service (MaaS)...

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

The Week Ahead: Bitcoin’s Next Move, Altcoins I’m Buying, Key Dates & More

The Week Ahead: Bitcoin’s Next Move, Altcoins I’m Buying, Key Dates & More

May 21, 2025
World Foundation secures 5M via token sales to expand biometric Orb-verified IDs globally

World Foundation secures $135M via token sales to expand biometric Orb-verified IDs globally

May 21, 2025
Open-Source Automated Red Teaming Engine for Kubernetes, APIs, and AI

Open-Source Automated Red Teaming Engine for Kubernetes, APIs, and AI

May 21, 2025
AI Still Doesn’t Understand the Word ‘No,’ MIT Study Finds

AI Still Doesn’t Understand the Word ‘No,’ MIT Study Finds

May 21, 2025
Top Crypto Websites to Follow for Latest News and Insights in 2025 – Analytics Insight

Top Crypto Websites to Follow for Latest News and Insights in 2025 – Analytics Insight

May 21, 2025

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

CRYPTO ENDEVR

About Us

Crypto Endevr aims to simplify the vast world of cryptocurrencies and blockchain technology for our readers by curating the most relevant and insightful articles from around the web. Whether you’re a seasoned investor or new to the crypto scene, our mission is to deliver a streamlined feed of news and analysis that keeps you informed and ahead of the curve.

Links

Home
Privacy Policy
Terms and Services

Resources

Glossary

Other

About Us
Contact Us

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

© Copyright 2024. All Right Reserved By Crypto Endevr.

No Result
View All Result
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms

Copyright © 2024. All Right Reserved By Crypto Endevr