Sunday, 8 Feb 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Ransomware gangs seize a new hostage: your AWS S3 buckets
Global Market

Ransomware gangs seize a new hostage: your AWS S3 buckets

Last updated: November 23, 2025 6:48 pm
Published November 23, 2025
Share
cloud technology protection information cybersecurity indentity
SHARE

To succeed, attackers usually search for S3 buckets which have: versioning disabled ( so outdated variations can’t be restored), object-lock disabled ( so recordsdata could be overwritten or deleted), extensive write permissions (by way of mis-configured IAM insurance policies or leaked credentials), and maintain high-value knowledge (backup recordsdata, manufacturing config dumps).

As soon as inside, the attackers attempt to impose a “full and irreversible lockout” of information, which can contain encryption objects with keys inaccessible to the sufferer, deleting backups, and scheduling key deletion so AWS and the client can’t get better the info.

“This analysis is a scientific and theoretical risk modelling train on how an attacker may encrypt and ransom an AWS setting inside an account boundary–one thing we’ve talked about over the past 10 years,” mentioned Trey Ford, chief technique and belief officer at Bugcrowd.

Weaponizing cloud encryption and key administration

Development Micro has identified 5 S3 ransomware variants that more and more exploit AWS’s built-in encryption paths. One abuses default AWS-managed KMS keys (SSE-KMS) by encrypting knowledge with an attacker-created key and scheduling that key for deletion. One other makes use of customer-provided keys (SSE-C), the place AWS has no copy, making restoration inconceivable. The third one exfiltrates S3 bucket knowledge (with no versioning) and deletes the originals.

The ultimate two variants go deeper into key administration infrastructure. One depends on imported key materials (BYOK), letting attackers encrypt knowledge after which destroy or expire the imported keys. The opposite abuses AWS’s Exterior Key Retailer (XKS), the place key operations occur exterior AWS, which signifies that if attackers management the exterior key supply, neither the client nor AWS can restore entry. Collectively, the methods reveal that attackers are utilizing AWS itself because the encryption mechanism.

See also  Gauging system activity on Linux with dstat

“I can’t recall having seen this executed within the wild,” Ford added. “This particularly targets the usage of exterior or customer-provided keys (SSE-C or XKS, respectively) to claim management over key administration for the cryptography utilized in storage.”

Source link

TAGGED: AWS, buckets, gangs, hostage, ransomware, seize
Share This Article
Twitter Email Copy Link Print
Previous Article Google’s ‘Nested Learning’ paradigm could solve AI's memory and continual learning problem Google’s ‘Nested Learning’ paradigm could solve AI's memory and continual learning problem
Next Article Mitigating business data accuracy threats Mitigating business data accuracy threats
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

UK establishes LASR to counter AI security threats

The UK is establishing the Laboratory for AI Safety Analysis (LASR) to assist shield Britain…

November 25, 2024

Eaton Debuts Modular Data Center Solution to Meet Edge and AI/ML Demand

Sensible energy administration vendor Eaton has introduced the North American debut of a cutting-edge new…

March 27, 2024

Mistral AI makes waves with deals across tech giants including Microsoft, IBM

Paris-based startup Mistral AI has cemented itself as a rising star within the synthetic intelligence…

March 1, 2024

AtlasEdge and Colt partner to power Portugal’s digital future

Collectively, AtlasEdge and Colt’s mixed experience instantly addresses the demand for strong and dependable connectivity…

March 21, 2025

CrowdStrike Blames Crash on Buggy Security Content Update

A buggy “safety content material configuration replace” to CrowdStrike’s Falcon sensor, which is aimed toward…

July 25, 2024

You Might Also Like

System administrator typing supercomputer hub disaster recovery plan on laptop to provide fast restoration of service, limiting damage and minimizing interruptions to normal operations
Global Market

8 hot networking trends for 2026

By saad
Shutterstock Germany Only - News - Intel Factory Germany September 2024
Global Market

Intel sets sights on data center GPUs amid AI-driven infrastructure shifts

By saad
Side view of technician or engineer with headset and laptop standing in industrial factory.
Global Market

Is private 5G/6G important after all?

By saad
Levi’s Stadium hosts Super Bowl LX
Global Market

Super Bowl LX raises network expectations

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.