Cloud Posse uses atmos to easily orchestrate multiple environments using Terraform. This example creates a role with the name eg-prod-app with permission to grant read-write access to S3 bucket, and ...
Attackers access storage buckets with exposed AWS keys The files are then encrypted and scheduled for deletion after a week Halycon says it observed at least two victims being attacked this way ...
"Historically AWS Identity IAM keys are leaked and used for data theft but if this approach gains widespread adoption, it could represent a significant systemic risk to organizations relying on AWS S3 ...
According to Halcyon, because the attack relies on AWS’s infrastructure for encryption, it is impossible to recover the encrypted data without the symmetric AES-256 keys required to decrypt it.