DomCII/OTEMERALDWHALE steals over 15,000 cloud credentials and stores data in S3 bucket

EMERALDWHALE steals over 15,000 cloud credentials and stores data in S3 bucket

Objavljeno na

spot_img

Recently, a global cyber operation known as EMERALDWHALE has come to light, revealing a sophisticated attack that compromised over 15,000 cloud service credentials. The attackers behind EMERALDWHALE targeted misconfigured Git and Laravel files, exploiting vulnerabilities to steal sensitive information and use it for malicious purposes.

The Sysdig Threat Research Team uncovered the EMERALDWHALE operation, which focused on exploiting misconfigured web services to access cloud credentials. By targeting Git configurations and Laravel environment files, attackers were able to steal a vast amount of credentials, with each potentially fetching hundreds of dollars on the black market.

The attack chain used by EMERALDWHALE involved the use of private tools to scan the internet for servers with exposed Git configuration files and Laravel environment files. Once these files were located, the attackers used specialized tools to extract usernames, passwords, API keys, and other sensitive information. This data was then used to clone private repositories and test for valid cloud service credentials, which were subsequently used for phishing, spam campaigns, and further compromises of cloud accounts. The stolen data was stored in compromised S3 buckets, increasing the risk of data breaches and account compromises.

Two main tools were identified in the EMERALDWHALE operation: MZR V2 and Seyzo-v2. These tools facilitated target discovery, credential extraction, repository cloning, and credential validation. Additionally, Multigrabber v8.5 was used to exploit vulnerabilities in Laravel and steal sensitive information from exposed environment files.

The emergence of operations like EMERALDWHALE highlights the increasing profitability of the stolen credentials market for cybercriminals. Exposed Git configurations were found to be sold for significant amounts, while valid cloud service credentials can fetch considerable profits when sold in bulk or through automated shops.

The importance of proper configuration management in securing sensitive information cannot be overstated. Taking steps to ensure that Git configuration files are not publicly accessible, restricting access to necessary variables, and regularly scanning for vulnerabilities are essential in preventing attacks like EMERALDWHALE.

Experts in the cybersecurity field have emphasized the need for monitoring the behavior of identities associated with credentials to protect against such threats. Organizations are advised to adopt an “assumed breach” posture and enhance their security measures to mitigate the risks posed by cyber attacks targeting credentials.

As the cyber threat landscape continues to evolve, staying informed about best practices for cloud computing security and remaining vigilant against potential vulnerabilities is crucial for organizations and individuals alike. By learning from incidents like EMERALDWHALE, we can strengthen our defenses and protect against future attacks that seek to exploit exposed credentials and sensitive information.

Link na izvor

Najnoviji članci

OWASP Issues AI Security Recommendations

The Open Worldwide Application Security Project (OWASP) has recently unveiled a series of new...

Cisco Notifies Small Number of Customers after Unauthorized Access to Non-Public Files

In recent news, tech giant Cisco has confirmed that a hacker accessed files during...

Download the AI in the Enterprise (for Real) Spotlight

The November 2024 issue of Enterprise Spotlight has been released by the editorial teams...

A new SharePoint vulnerability is already being taken advantage of

Attackers have been taking advantage of a recently exposed remote code execution flaw in...

Još ovako

OWASP Issues AI Security Recommendations

The Open Worldwide Application Security Project (OWASP) has recently unveiled a series of new...

Cisco Notifies Small Number of Customers after Unauthorized Access to Non-Public Files

In recent news, tech giant Cisco has confirmed that a hacker accessed files during...

Download the AI in the Enterprise (for Real) Spotlight

The November 2024 issue of Enterprise Spotlight has been released by the editorial teams...
hrCroatian