Friday, 27 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Ransomware gangs find a new hostage: Your AWS S3 buckets
Global Market

Ransomware gangs find a new hostage: Your AWS S3 buckets

Last updated: November 21, 2025 12:37 pm
Published November 21, 2025
Share
cloud technology protection information cybersecurity indentity
SHARE

To succeed, attackers sometimes search for S3 buckets which have: versioning disabled ( so outdated variations can’t be restored), object-lock disabled ( so recordsdata might be overwritten or deleted), huge write permissions (through mis-configured IAM insurance policies or leaked credentials), and maintain high-value information (backup recordsdata, manufacturing config dumps).

As soon as inside, the attackers attempt to impose a “full and irreversible lockout” of knowledge, which can contain encryption objects with keys inaccessible to the sufferer, deleting backups, and scheduling key deletion so AWS and the shopper can’t recuperate the info.

“This analysis is a scientific and theoretical menace modelling train on how an attacker may encrypt and ransom an AWS surroundings inside an account boundary–one thing we’ve talked about during the last 10 years,” mentioned Trey Ford, chief technique and belief officer at Bugcrowd.

Weaponizing cloud encryption and key administration

Development Micro has identified 5 S3 ransomware variants that more and more exploit AWS’s built-in encryption paths. One abuses default AWS-managed KMS keys (SSE-KMS) by encrypting information with an attacker-created key and scheduling that key for deletion. One other makes use of customer-provided keys (SSE-C), the place AWS has no copy, making restoration unimaginable. The third one exfiltrates S3 bucket information (with no versioning) and deletes the originals.

The ultimate two variants go deeper into key administration infrastructure. One depends on imported key materials (BYOK), letting attackers encrypt information after which destroy or expire the imported keys. The opposite abuses AWS’s Exterior Key Retailer (XKS), the place key operations occur exterior AWS, which signifies that if attackers management the exterior key supply, neither the shopper nor AWS can restore entry. Collectively, the strategies reveal that attackers are utilizing AWS itself because the encryption mechanism.

See also  AWS plans to invest £8 billion in the UK

“I can’t recall having seen this executed within the wild,” Ford added. “This particularly targets using exterior or customer-provided keys (SSE-C or XKS, respectively) to say management over key administration for the cryptography utilized in storage.”

Source link

TAGGED: AWS, buckets, find, gangs, hostage, ransomware
Share This Article
Twitter Email Copy Link Print
Previous Article Why SSE Matters More Than Mesh for Data Centers Why SSE Matters More Than Mesh for Data Centers
Next Article Verne and Nscale: Pioneering sustainable AI infrastructure in the Nordics Verne and Nscale: Pioneering sustainable AI infrastructure in the Nordics
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

IBM wins UK lawsuit against LzLabs for mainframe intellectual property theft

IBM licensed its mainframe software program to Winsopia starting in 2013, in accordance with the…

March 11, 2025

Semble Closes $15M Series B Funding Round

Semble, a London, UK-based supplier of an built-in scientific system and innovator in healthtech, raised…

October 29, 2024

Cirrascale Announces Inference Cloud with Qualcomm’s AI Suite

World provider of cutting-edge cloud options for AI and high-performance computing (HPC), Cirrascale Cloud Companies,…

March 13, 2025

Dapple Security Raises $2.3M in Pre-Seed Funding

Dapple Security, a Denver, CO-based developer of a digital safety expertise platform, raised $2.3M in…

February 17, 2024

Digital Realty achieves 100% renewable energy coverage in Singapore

The corporate has achieved this 100% renewable vitality protection milestone by means of direct retail…

April 22, 2025

You Might Also Like

AI services
Global Market

Data center poaching adds to staffing crisis

By saad
It’s time to separate fact from fiction on data centre energy demand
Global Market

It’s time to separate fact from fiction on data centre energy demand

By saad
3D Rendering of digital binary data on microchip with glow circuit board background. Concept of for deep machine learning, crypto currency, hi tech product uses. Big data visualization, cpu processing
Global Market

Arm shifts course, moves into silicon business

By saad
LINX completes LON2 network refresh with Nokia
Global Market

LINX completes LON2 network refresh with Nokia

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.