Some major firms are being targeted by this dangerous new cybercrime campaign

Data leak
(Image credit: Shutterstock)

Poor cybersecurity hygiene, which included exposed environment variable files, long-lived credentials, and the absence of least privilege architecture have resulted in multiple organizations being targeted with ransom attacks, experts have warned.

A report from cybersecurity researchers Unit 42 outlined how they observed a successful extortion campaign’s cloud operations that leveraged exposed environment variable files (.ENV) that held sensitive data such as login credentials.

The unnamed threat actors set up their attack infrastructure within Amazon Web Services (AWS) environments belonging to target organizations, and then used it as a launchpad to scan more than 230 million unique targets for sensitive information. As Unit 42 further explained, the campaign targeted 110,000 domains, and resulted in more than 90,000 unique variables in the .ENV files being exposed.

No encryption

Of those variables, 7,000 belonged to organizations’ cloud services. That, however, does not necessarily mean 7,000 compromised organizations, as one enterprise most likely owns multiple variables. Still, the crooks stole at least 1,500 variables belonging to social media accounts, which might be a good indication of the number of victims. Furthermore, the attackers used multiple source networks to facilitate the operation.

While the crooks did steal sensitive data and demanded money for it, they did not encrypt their targets’ IT infrastructure. This is yet another example of threat actors pivoting away from encryption malware, and into simple data ransom attacks. Some researchers believe building, maintaining, and then deploying encryptors, is too expensive and cumbersome. Simply holding data ransom is, apparently, equally as effective:

"The campaign involved attackers successfully ransoming data hosted within cloud storage containers," Unit 42 said. "The event did not include attackers encrypting the data before ransom, but rather they exfiltrated the data and placed the ransom note in the compromised cloud storage container."

The attackers did not leverage any system vulnerability or bug, the researchers concluded. This is all the result of human error and recklessness.

“AWS services and infrastructure are not affected by the findings of these researchers," an AWS spokesperson told TechRadar Pro.

"The issues described in this blog were a result of a bad actor abusing misconfigured web applications—hosted both in the cloud and elsewhere—that allowed public access to environment variable (.env) files. Some of these files contained various kinds of credentials, including AWS credentials which were then used by the bad actor to call AWS APIs. Environment variable files should never be publicly exposed, and even if kept private, should never contain AWS credentials. AWS provides a variety of easy-to-use mechanisms for web applications to access temporary AWS credentials in a secure fashion. We recommend customers follow best practices for AWS Identity and Access Management (IAM) to help secure their AWS resources.”

Via The Hacker News

More from TechRadar Pro

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
AWS S3 feature abused by ransomware hackers to encrypt storage buckets
Illustration of a hooked email hovering over a mobile phone
AWS misconfigurations reportedly used to launch phishing attacks
Concept art representing cybersecurity principles
How to combat exfiltration-based extortion attacks
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Flags of Iran, China, Russia and North Korea on a wall. China North Korea Iran Russia alliance
Cybercrime is helping fund rogue nations across the world - and it's only going to get worse, Google warns
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras