HomeCII/OTCybercrime Gangs Steal Thousands of AWS Credentials

Cybercrime Gangs Steal Thousands of AWS Credentials

Published on

spot_img

A recent cyber operation has been uncovered by independent cybersecurity researchers, Noam Rotem and Ran Locar, revealing how cybercriminal gangs exploited vulnerabilities in public websites to steal Amazon Web Services (AWS) cloud credentials and other data from thousands of organizations. This mass cyber operation involved scanning millions of sites for vulnerable endpoints.

The operation was reported by the researchers to vpnMentor, which then published a blog post on December 9 detailing their findings. The attackers behind this operation are believed to be associated with known threat groups Nemesis and ShinyHunters. ShinyHunters, in particular, made headlines earlier this year for a cloud breach that affected Ticketmaster customers.

Jim Routh, the chief trust officer at Saviynt, a cloud identity and security management firm, noted that these cybercriminal syndicates operate at scale for profit and leverage their technical skills to exploit weaknesses in cloud computing environments.

Interestingly, the researchers stumbled upon this operation when the attackers made a critical error of their own by storing stolen data in an AWS Simple Storage Service (S3) bucket that was left open due to misconfiguration. The bucket contained a significant amount of data, including infrastructure credentials, source code, application databases, and credentials to external services.

The researchers reconstructed a two-step attack sequence used by the attackers. They started by scanning vast ranges of IPs belonging to AWS to identify vulnerabilities and mistakes. Subsequently, they used tools to expand their attack surface by extracting domain names associated with the IPs and analyzing SSL certificates to further identify potential targets.

Once the targets were identified, the attackers scanned for exposed endpoints, categorized systems, and extracted sensitive information like database access credentials, AWS customer keys, passwords, and more. The stolen data was then stored for exploitation at a later stage of the operation.

The researchers were able to track the attackers using tools and signatures associated with ShinyHunters and Nemesis Blackmarket. They promptly reported their findings to Israeli authorities and AWS Security, which took immediate action to mitigate the impact and notify affected customers.

AWS confirmed that the operation targeted flaws on the customer application side of the shared responsibility cloud model, absolving AWS of any responsibility. The security team completed their investigation and mitigation, allowing the researchers to disclose the incident.

To prevent similar attacks, organizations are advised to avoid hardcoded credentials, conduct regular web scans for vulnerabilities, implement a web application firewall, and rotate keys and passwords periodically. Additionally, embedding CanaryTokens in code can serve as tripwires to alert administrators of unauthorized access attempts.

This incident serves as a valuable lesson for organizations to adapt and enhance their cyber controls to achieve resilience in the face of evolving cyber threats. Organizations should prioritize cybersecurity measures to protect their valuable data and resources from malicious actors.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...