HomeCII/OTEMERALDWHALE steals over 15,000 cloud credentials and stores data in S3 bucket

EMERALDWHALE steals over 15,000 cloud credentials and stores data in S3 bucket

Published on

spot_img

Recently, a global cyber operation known as EMERALDWHALE has come to light, revealing a sophisticated attack that compromised over 15,000 cloud service credentials. The attackers behind EMERALDWHALE targeted misconfigured Git and Laravel files, exploiting vulnerabilities to steal sensitive information and use it for malicious purposes.

The Sysdig Threat Research Team uncovered the EMERALDWHALE operation, which focused on exploiting misconfigured web services to access cloud credentials. By targeting Git configurations and Laravel environment files, attackers were able to steal a vast amount of credentials, with each potentially fetching hundreds of dollars on the black market.

The attack chain used by EMERALDWHALE involved the use of private tools to scan the internet for servers with exposed Git configuration files and Laravel environment files. Once these files were located, the attackers used specialized tools to extract usernames, passwords, API keys, and other sensitive information. This data was then used to clone private repositories and test for valid cloud service credentials, which were subsequently used for phishing, spam campaigns, and further compromises of cloud accounts. The stolen data was stored in compromised S3 buckets, increasing the risk of data breaches and account compromises.

Two main tools were identified in the EMERALDWHALE operation: MZR V2 and Seyzo-v2. These tools facilitated target discovery, credential extraction, repository cloning, and credential validation. Additionally, Multigrabber v8.5 was used to exploit vulnerabilities in Laravel and steal sensitive information from exposed environment files.

The emergence of operations like EMERALDWHALE highlights the increasing profitability of the stolen credentials market for cybercriminals. Exposed Git configurations were found to be sold for significant amounts, while valid cloud service credentials can fetch considerable profits when sold in bulk or through automated shops.

The importance of proper configuration management in securing sensitive information cannot be overstated. Taking steps to ensure that Git configuration files are not publicly accessible, restricting access to necessary variables, and regularly scanning for vulnerabilities are essential in preventing attacks like EMERALDWHALE.

Experts in the cybersecurity field have emphasized the need for monitoring the behavior of identities associated with credentials to protect against such threats. Organizations are advised to adopt an “assumed breach” posture and enhance their security measures to mitigate the risks posed by cyber attacks targeting credentials.

As the cyber threat landscape continues to evolve, staying informed about best practices for cloud computing security and remaining vigilant against potential vulnerabilities is crucial for organizations and individuals alike. By learning from incidents like EMERALDWHALE, we can strengthen our defenses and protect against future attacks that seek to exploit exposed credentials and sensitive information.

Source link

Latest articles

Hackers allege access to Nokia internal data, intending to sell for $20,000

In a recent development, hackers have claimed to have successfully breached the cybersecurity defenses...

Free Suffers Data Breach: Hacker Alleges Sale of Stolen Information

A cybersecurity expert confirmed on Wednesday that the hacker who previously advertised the data...

OWASP Enhances GenAI Security Guidance in Response to Increasing Threat of Deepfakes

Deepfakes and other generative-AI attacks are becoming increasingly common, raising concerns about a potential...

10 Tools for API Security Testing to Minimize Risk

API security is a crucial aspect of modern application architecture, given the potential vulnerabilities...

More like this

Hackers allege access to Nokia internal data, intending to sell for $20,000

In a recent development, hackers have claimed to have successfully breached the cybersecurity defenses...

Free Suffers Data Breach: Hacker Alleges Sale of Stolen Information

A cybersecurity expert confirmed on Wednesday that the hacker who previously advertised the data...

OWASP Enhances GenAI Security Guidance in Response to Increasing Threat of Deepfakes

Deepfakes and other generative-AI attacks are becoming increasingly common, raising concerns about a potential...
en_USEnglish