Technovage Solution Co., Ltd’s Post

Attackers exploited misconfigured AWS .env files to ransom data in S3 containers, targeting over 100,000 domains. Their success resulted from weak cloud security practices, such as exposed credentials and insufficient access controls, highlighting the need for stronger authentication, encryption, and secure configurations. They scanned 230 million targets, extracting data from 110,000 domains. Using VPS, Tor, and VPNs, they moved laterally and exfiltrated data. The campaign highlights the dangers of exposed .env files and the need for strict access controls and secrets management. Cyble identified key compromise indicators. Read more: https://lnkd.in/gZZeutWh For more information, please contact us: Phone: +855 (92) 282 412 Email: info@technovage.io Telegram: @TechnovageSolution Follow us on telegram for more news and discussion Our Channel: https://lnkd.in/gqMPM8iA Our Group: https://lnkd.in/gKb9CT7d #technovagesolution #ransomware #cyberthreatintelligence

  • No alternative text description for this image

To view or add a comment, sign in

Explore topics