Cybercriminals have taken a significant step in ransomware tactics by encrypting data stored in Amazon Web Services (AWS) cloud storage, specifically targeting Amazon S3 buckets. Researchers from cybersecurity firm Halcyon have observed this novel approach, which leverages AWS’s own encryption tools to lock organizations out of their data, with ransom payments demanded for recovery.
The Rise of ‘Codefinger’ Hackers
Halcyon identified a new group of cybercriminals, dubbed “Codefinger,” responsible for the attacks. Since December, two notable incidents have been attributed to this group, both targeting AWS-native software developers. While intelligence on Codefinger’s origin, operations, and typical targets remains limited, their methods represent a concerning evolution in ransomware.
According to Halcyon, the attackers exploit AWS’s Server-Side Encryption with Customer-Provided Keys (SSE-C), a feature introduced in 2014. By stealing a customer’s AWS account credentials and obtaining encryption keys, the hackers encrypt critical data stored in S3 buckets. Victims are then locked out, with the attackers demanding ransom payments in exchange for the decryption keys.
Tactics and Threats
This method of attack is particularly alarming due to its use of AWS’s native services. By employing SSE-C, the encryption process is secure and renders the data irrecoverable without the cooperation of the attackers. The hackers add urgency to their demands by marking files for deletion within seven days, forcing victims to act quickly or risk permanent data loss.
Ransom notes provided by the hackers include instructions for payment and warnings against altering AWS account permissions, further pressuring victims into compliance. Researchers noted that this approach bears similarities to other ransomware incidents where legitimate encryption tools, like Microsoft’s BitLocker, were used against victims.
Halcyon described the tactic as a “significant evolution in ransomware capabilities” and warned that this method may soon be adopted by other cybercriminal groups, increasing the threat to AWS customers globally.
Amazon’s Response
An AWS spokesperson acknowledged the issue, stating that the company notifies affected customers when leaked keys are identified. AWS takes immediate actions, such as applying quarantine policies to minimize risks without disrupting IT environments. The company also provides resources and support for customers to strengthen their security measures.
AWS strongly advises against storing credentials in source code or configuration files, a practice that has long been exploited by hackers. Customers are urged to adopt best practices, such as:
- Enforcing Multi-Factor Authentication (MFA) to secure AWS accounts.
- Rotating access keys regularly and minimizing their exposure.
- Using AWS Identity and Access Management (IAM) to apply the principle of least privilege.
Broader Implications and Recommendations
This development reflects a growing trend in ransomware targeting cloud storage. Historically, S3 buckets have been vulnerable due to misconfigurations that leave them exposed to the internet, leading to numerous data breaches. While AWS offers robust security features, the responsibility for securing resources is shared with the customer.
Key Recommendations for AWS Users:
Audit Access Permissions: Regularly review and limit access to S3 buckets.
Monitor for Leaked Credentials: Employ monitoring tools to detect exposed keys and unusual activity.
Encrypt Data Securely: Use server-side encryption with AWS-managed keys (SSE-S3) or AWS Key Management Service (SSE-KMS) instead of customer-provided keys.
Back Up Critical Data: Maintain backups in secure, isolated environments to ensure data recovery without paying ransoms.
Implement Real-Time Alerts: Configure AWS CloudTrail and GuardDuty to monitor account activities and detect potential threats.
A Widening Trend
Codefinger’s use of SSE-C underscores a broader trend of ransomware groups exploiting legitimate tools to amplify their attacks. Similar techniques have been observed with other platforms, such as Microsoft BitLocker. Researchers warn that such methods are likely to gain traction, particularly as organizations increasingly rely on cloud services.
Conclusion
The emergence of Codefinger and their sophisticated ransomware tactics serve as a wake-up call for organizations using AWS services. While AWS provides robust security features, the shared responsibility model places the onus on customers to ensure proper configurations and credential management. Organizations must act swiftly to implement stronger security practices and mitigate the risks posed by this evolving threat.
Halcyon’s findings underline the critical need for vigilance, as attackers continue to innovate. As ransomware actors refine their methods, only a proactive, layered defense strategy will protect businesses from becoming victims of these advanced threats.
Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a

