See every side of every news story
Published loading...Updated

Ransomeware Exploits AWS Encryption to Lock S3 Buckets

  • A new ransomware campaign named Codefinger targets Amazon S3 buckets by encrypting them with AWS's server-side encryption using customer-provided keys, demanding ransoms for decryption keys.
  • Halcyon discovered that Codefinger has encrypted at least two victims' S3 buckets using compromised AWS credentials to access encryption keys.
  • The attack sets a seven-day file deletion policy and warns victims against changing permissions, threatening to end negotiations if they do.
  • Amazon stated they notify customers of exposed keys and encourage strict security protocols to prevent unauthorized access.
Insights by Ground AI
Does this summary seem wrong?

14 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center
Factuality

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

Forbes broke the news in United States on Monday, January 13, 2025.
Sources are mostly out of (0)

You have read 1 out of your 5 free daily articles.

Join millions of well-informed readers who use Ground to compare coverage, check their news blindspots, and challenge their worldview.