Testing CYCL’s Behavioural Detection Engine On The New AWS S3 Ransomware Attack 

Discover how CYCL’s Behavioural Detection engine identified a stealthy AWS SSE-C ransomware attack in real time. This whitepaper breaks down the full simulation, detection process, and mitigation steps.
BugSec

White Paper

Attack Overview 

A new ransomware campaign has surfaced, leveraging Amazon Web Services’ (AWS) Server-Side Encryption with Customer Provided Keys to encrypt data in Amazon S3 buckets. 

This attack was launched by a group known as “Codefinger,” to exploit legitimate cloud-native features rather than vulnerabilities in AWS itself. 

The attackers use compromised AWS account credentials with permissions to read and write S3 objects. By employing AWS’s SSE-C feature, they encrypt data stored in targeted S3 buckets with AES-256 encryption keys that only they possess. 

This innovative approach renders the data irrecoverable without paying the ransom. 

Unlike traditional ransomware, which encrypts files locally or in transit, this attack integrates seamlessly with AWS’s built-in encryption infrastructure. 

Download the full whitepaper to learn how CYCL can help you secure your cloud environment with confidence.

We use cookies to make your experience better
By using this site you accept our use of cookies to personalize and analyze website usage and to create relevant ads. We may also share data with partners for the same purpose. Read More