misk@sopuli.xyz to Technology@lemmy.worldEnglish · 22 days agoRansomware crew abuses AWS native encryptionwww.theregister.comexternal-linkmessage-square4fedilinkarrow-up146arrow-down12cross-posted to: cybersecurity@sh.itjust.works
arrow-up144arrow-down1external-linkRansomware crew abuses AWS native encryptionwww.theregister.commisk@sopuli.xyz to Technology@lemmy.worldEnglish · 22 days agomessage-square4fedilinkcross-posted to: cybersecurity@sh.itjust.works
minus-squarelogicbomb@lemmy.worldlinkfedilinkEnglisharrow-up10·22 days agoIt says they use publicly exposed or leaked IAM keys with RW permission to do this, in case anybody is interested in how they get in.
It says they use publicly exposed or leaked IAM keys with RW permission to do this, in case anybody is interested in how they get in.