Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
AWS customers face massive breach amid alleged ShinyHunters regroup
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Terabytes of data belonging to thousands of AWS customers, including customer details, AWS credentials, and proprietary source code, were compromised in a large-scale cyber operation linked to the now-defunct ShinyHunters hacking group.Independent cybersecurity researchers, Noam Rotem and Ran Locar, found the operation exploiting vulnerabilities and misconfigurations in a number of public sites to gain unauthorized access to sensitive data.”We have identified a significant operation that scanned millions of websites, exploiting vulnerabilities in improperly configured public sites,” said researchers from vpnMentor, the cybersecurity research firm that collaborated with Rotem and Locar to publish a report on the findings. “This incident resulted in the exposure of sensitive keys and secrets, granting unauthorized access to customer data.”The report noted that a “sophisticated and extensive” infrastructure designed by French-speaking threat actors was used to conduct comprehensive scans of the internet for detecting exploitable vulnerabilities. The S3 bucket attackers used to store the data stolen from the victims had, ironically, a misconfiguration which resulted in it being open to analysis by the researchers.”The S3 bucket was being used as a ‘shared drive’ between the attack group members, based on the source code of the tools used by them,” the researchers said.The code in the S3 bucket revealed that the breach involved discovery and exploitation, starting with AWS IP ranges expanded into domain lists via Shodan and SSL certificate analysis. Scans then targeted exposed endpoints and system types, extracting data like database credentials and AWS keys.Attackers deployed custom scripts, including Python and PHP, to exploit open-source tools like Laravel to harvest credentials, including Git, SMTP, and cryptocurrency keys. Verified credentials were stored for later use, and remote shells were installed for deeper access when needed.AWS keys were tested for access to IAM, SES, SNS, and S3 services, enabling attackers to establish persistence, send phishing emails, and steal sensitive data. AI service keys were notably excluded, likely due to outdated tools or limited value.”We originally discovered the operation in August of 2024, and on September 26, we sent the report to AWS Security, since most of the victims targeted by the attack were AWS customers,” the researchers said in the report. “They began to take immediate actions to mitigate the impact and alert the affected customers of the risk.”Researchers highlighted that the misconfigurations enabling this attack fall under customers’ responsibilities within the shared responsibility model and could happen with any Cloud Service Provider (CSP).On November 9, the AWS security team confirmed the complete handling of the issue.

Evidence points to a ShinyHunters regroup

The attack infrastructure, that Rotem and Locar stumbled upon, revealed the code used by the attackers along with the potential identities of a few people behind it.”While the group conducts its business under a different name, ‘Nemesis,’ we were also able to connect some of the activity to the now defunct attack group ‘Shiny Hunters,’” the researchers said.ShinyHunters is a notorious hacking group known for running BreachForums with Baphomet before it was decommissioned by a law enforcement seizure in May.While no ShinyHunters activity was reported since, BreachForums was revived shortly after, possibly under a new administration by prominent hackers like IntelBroker.”The operators use tools which appear to be the same as those used by the ‘ShinyHunters’ hacking group,” researchers said, adding that the tools are documented in French and signed by “Sezyo Kaizen.” The alias has been linked to Sebastien Raoult, a ShinyHunters member, who was arrested and extradited to the US and pleaded guilty in January 2024 to charges of conspiracy to commit wire fraud and aggravated identity theft.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3621101/aws-customers-face-massive-breach-amid-alleged-shinyhunters-regroup.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link