Ransomeware Exploits AWS Encryption to Lock S3 Buckets
- A new ransomware campaign named Codefinger targets Amazon S3 buckets by encrypting them with AWS's server-side encryption using customer-provided keys, demanding ransoms for decryption keys.
- Halcyon discovered that Codefinger has encrypted at least two victims' S3 buckets using compromised AWS credentials to access encryption keys.
- The attack sets a seven-day file deletion policy and warns victims against changing permissions, threatening to end negotiations if they do.
- Amazon stated they notify customers of exposed keys and encourage strict security protocols to prevent unauthorized access.
14 Articles
14 Articles


Ransomware abuses Amazon AWS feature to encrypt S3 buckets
A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key. [...]
Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days
A new ransomware group called Codefinger targets AWS S3 buckets by exploiting compromised or publicly exposed AWS keys to encrypt victims' data using AWS's own SSE-C encryption, rendering it inaccessible without the attacker-generated AES-256 keys. While other security researchers have documented techniques for encrypting S3 buckets, "this is the first instance we know of leveraging AWS's native secure encryption infrastructure via SSE-C in the …
Coverage Details
Bias Distribution
- 100% of the sources are Center
To view factuality data please Upgrade to Premium