Key Takeaways

  • A complicated cloud extortion marketing campaign used misconfigured AWS .env recordsdata to focus on 110,000 domains, steal credentials and ransom cloud storage knowledge.
  • The risk actors obtained AWS Id and Entry Administration (IAM) entry keys by scanning for uncovered .env recordsdata hosted on unsecured net purposes. These setting variable recordsdata (.env recordsdata) outline configuration variables inside purposes and platforms and infrequently comprise secrets and techniques.
  • Cyble’s risk intelligence platform means that .env exposures could also be extra frequent than even this largescale assault suggests.
  • The IAM credentials uncovered by the attackers had permissions to create new IAM roles and fasten IAM insurance policies to present roles, which they used to create new IAM assets with limitless entry.

Overview

An extortion marketing campaign focused greater than 100,000 domains through the use of misconfigured AWS setting variable recordsdata (.env recordsdata) to ransom knowledge saved in S3 containers.

The delicate marketing campaign employed automation strategies and in depth data of cloud structure to extend the velocity and success of the marketing campaign, underscoring the necessity for cloud safety greatest practices akin to sturdy authentication and entry controls, knowledge encryption, safe configuration administration, and monitoring and logging.

The attackers had been in a position to leverage .env recordsdata that contained delicate info akin to credentials from quite a few purposes due to a number of safety failures on the a part of cloud customers. These insecure practices embrace: