Codefinger broke the mold. It’s not just ransomware — it’s a signal that cloud-targeted attacks are the new normal. Justin Giardina explains what’s next:
www.csoonline.com/article/3958...
#RansomwareEvolution #Codefinger #CloudSecurity @edmur.bsky.social
🚨New #ransomware campaign! It encrypts Amazon S3 buckets using AWS's SSE-C. #Codefinger has encrypted at least 2 victims—but could escalate or be adopted by others soon.😰 Is your #security team prepared for a incident like this?🤔 www.bleepingcomputer.com/news/securit... #threatactor #cybersecurity
🚨 New Amazon Ransomware Alert! 🚨
The Codefinger ransomware is targeting AWS users, encrypting critical data with no recovery without ransom.
technijian.com/amazon/new-a...
#Ransomware #CyberSecurity #AWS #CloudSecurity #DataProtection #Codefinger #TechNews #Technijian #StaySecure #BusinessSafety
New #ransomware angle I had not seen before - the threat actor #codefinger encrypting S3 buckets using customer-provided key function www.bleepingcomputer.com/news/securit...
Codefinger ランサムウェア集団が侵害された AWS キーを使用して S3 バケットを暗号化
Codefinger ransomware gang uses compromised AWS keys to encrypt S3 bucket #SecurityAffairs (Jan 15)
#Codefinger #ランサムウェア #AWS #S3バケット #クラウドセキュリティ
www.forbes.com/sites... #cybersecurity #codefinger #ransomware #AWS #cloud
ランサムウェア集団が AWS ネイティブ暗号化を悪用し、データ破壊タイマーを 7 日間に設定
Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days #Register (Jan 13)
#Codefinger #ランサムウェア #AWS #S3バケット #サーバーサイド暗号化
Compromised AWS Keys Abused in Codefinger Ransomware Attacks
www.securityweek.com/compromised-...
#Infosec #Security #Cybersecurity #CeptBiro #AWSKeys #Codefinger #RansomwareAttacks
"A new #ransomware campaign targeting Amazon Web Services users by a threat actor known as #Codefinger has been confirmed in a Jan. 13 threat intelligence report from #Halcyon threat research and intelligence team."
@forbes.com Davey Winder details more: www.forbes.com/sites/daveyw...
New Amazon Ransomware Attack—‘Recovery Impossible’ Without Payment
A new ransomware threat, known as Codefinger, targeting users of Amazon Web Services S3 buckets, has now been confirmed.
#AWS #amazon #S3 #codefinger #ransomware #malware #security #cybersecurity #hackers #hacking #hacked
🚨 The new #Codefinger ransomware group is exploiting AWS's SSE-C to encrypt S3 buckets, using security features against users. Protect your credentials and enable 2FA! 🔐
🔗 hackread.com/codefinger-r...
#CyberSecurity #AWS #Ransomware #CyberAttack
📬 Ransomware-Angriffe auf AWS-Nutzer: S3-Buckets im Visier
#Cyberangriffe #ITSicherheit #AmazonWebServices #AWS #Codefinger #Ransomware #RansomwareAngriffe #S3Buckets
Angriffe auf #AWS-Kunden: Hacker verschlüsseln Daten in #S3-Buckets
Eine Hackergruppe missbraucht eine Verschlüsselungsfunktion von AWS, um Kunden des Cloudanbieters zu erpressen. Ein permanenter Datenverlust droht. #Codefinger
www.golem.de/news/angriff...
攻撃者はランサムウェアを使用せずにAWS S3データを暗号化している
Attackers are encrypting AWS S3 data without using ransomware #HelpNetSecurity (Jan 13)
#AWS #S3 #SSE-C #ランサムウェア #Codefinger #サイバーセキュリティ #データ保護
#Ransomware threat actors are increasingly abusing #AWS Server-Side Encryption (SSE-C) to encrypt S3 buckets. Most recently a TA known as #Codefinger is using this technique.
🕵 Monitoring S3 & encryption activity via CloudTrail & GuardDuty.
www.halcyon.ai/blog/abusing...
#CloudForensics #FOR509