The Register: Crooks stole AWS credentials from misconfigured sites then kept them in open S3 bucket

Source URL: https://www.theregister.com/2024/12/09/aws_credentials_stolen/
Source: The Register
Title: Crooks stole AWS credentials from misconfigured sites then kept them in open S3 bucket

Feedly Summary: ShinyHunters-linked heist thought to have been ongoing since March
Exclusive A massive online heist targeting AWS customers during which digital crooks abused misconfigurations in public websites and stole source code, thousands of credentials, and other secrets remains “ongoing to this day," according to security researchers.…

AI Summary and Description: Yes

Summary: The text discusses an ongoing cyber heist targeting AWS customers, where attackers exploited misconfigurations in public websites to steal sensitive data like credentials and source code. The incident highlights significant issues in cloud security, particularly regarding the shared responsibility model between cloud providers and their clients. The ease with which attackers accessed sensitive information underscores the critical need for organizations to improve their security practices, especially concerning proper credential management and awareness of exposure vulnerabilities.

Detailed Description: The investigation conducted by security researchers Noam Rotem and Ran Locar reveals a large-scale heist impacting AWS customers due to misconfigurations in their cloud environments. Highlights from their findings include:

– **Cybercriminal Activities**:
– Attackers connected to known cybercrime groups, Nemesis and ShinyHunters, have been identified as the culprits.
– A significant amount of sensitive data, including thousands of credentials, source code, and various API keys, was compromised.

– **Exploited Vulnerabilities**:
– The crooks utilized an open S3 bucket misconfigured by the owner to store over 2 TB of stolen data.
– Key examples of weak configurations include open repositories and unsecured databases, allowing the attackers to gather AWS customer credentials.

– **Shared Responsibility Model Complications**:
– The incident emphasizes the misinterpretation of the shared responsibility model in cloud services, which necessitates that customers secure their own configurations and credentials.
– The report criticizes the prevalent practice of hard-coded credentials in source code, which creates significant security risks.

– **Attack Methodology**:
– The attackers employed extensive pre-scanning activities, targeting 26.8 million AWS-related IPs, and confirming vulnerabilities by analyzing SSL certificates and endpoints.
– They utilized malicious scripts and tools to extract sensitive information and even to install remote shells for deeper access.

– **Recommendations for Organizations**:
– The report advises organizations to utilize security tools like AWS Secrets Manager to handle sensitive credentials and recommends a comprehensive audit of their cloud configurations.
– Crucial advice includes the prohibition of hard-coded credentials and thorough monitoring of AWS accounts via CloudTrail.

In summary, this incident serves as a cautionary tale illustrating possible vulnerabilities in cloud environments and the importance of rigorous security practices to prevent such data breaches. Security professionals must be vigilant in their approaches to cloud security and establish robust protocols to mitigate risks.