AWS S3 Feature Exploited by Ransomware Hackers to Encrypt Storage Buckets


  • Attackers access storage buckets with exposed AWS keys
  • The files are then encrypted and scheduled for deletion after a week.
  • Halycon says he observed at least two victims attacked in this way

Cybercriminals have begun exploiting legitimate AWS S3 features to encrypt victim deposits in a unique twist to the old ransomware attack.

Halycon researchers recently observed that several victims, all AWS-native software developers, were attacked in this way. In the attack, the group, called Codefinger, accessed its victims’ cloud storage buckets via publicly exposed or otherwise compromised AWS keys with read and write permissions.

Leave a Comment

Your email address will not be published. Required fields are marked *