Red Hat hackers Crimson Collective now going after AWS instances




  • Crimson Collective hackers attack AWS using exposed credentials to escalate privileges and leak data
  • Attackers use TruffleHog to find secrets, then create IAM users and access keys via API
  • Red Hat breach yielded 570GB of sensitive files, including 800 infrastructure-rich consulting records

Crimson Collective, the threat actor behind the recent Red Hat breach, is now going after Amazon Web Services (AWS) cloud environments, seeking to establish persistence, steal data, and extort money from victims.

Cybersecurity researchers Rapid7 discovered that attackers are using TruffleHog, an open source security tool designed to search for secrets, credentials, and API keys that may have been accidentally exposed in code repositories or other sources. After finding exposed AWS credentials, attackers create new IAM users and login profiles via API calls, and create new access keys, as well as escalate privileges by attaching new policies.

Leave a Comment

Your email address will not be published. Required fields are marked *