AWS .Env Files Hacked in Cloud Extortion Campaign, Data Held for Ransom

Published:

spot_img

Cloud Extortion Campaign Targets 100,000 Domains Using Misconfigured AWS .env Files

Researchers from Palo Alto Networks’ Unit 42 have uncovered a sophisticated extortion campaign that targeted over 100,000 domains by exploiting misconfigured AWS environment variable files (.env files) to ransom data stored in cloud containers. The attackers utilized automation techniques and in-depth knowledge of cloud architecture to enhance the speed and success of their campaign, highlighting the critical need for robust cloud security practices.

The campaign capitalized on multiple security failures within cloud users’ environments, including exposed environment variables, the use of long-lived credentials, and the absence of a least privilege architecture. By setting up infrastructure within organizations’ AWS environments, the attackers scanned over 230 million unique targets for sensitive information.

In total, the campaign targeted 110,000 domains, resulting in the exposure of more than 90,000 unique variables in .env files. The attackers successfully ransomed data hosted within cloud storage containers by exfiltrating the data and leaving ransom notes in compromised containers.

The researchers emphasized that the attack was not a result of vulnerabilities in cloud providers’ services but rather misconfigurations within victim organizations that exposed their .env files. The threat actors behind the campaign demonstrated advanced automation techniques and a deep understanding of cloud architectural processes.

Initial access to organizations’ cloud environments was gained through leaked AWS IAM credentials found in exposed .env files. The threat actors leveraged these credentials to escalate their privileges within victim cloud environments and create new AWS Lambda functions for their automated scanning operation.

The researchers noted a growing trend of attackers targeting cloud IAM credentials for initial access, emphasizing the importance of securing sensitive files and implementing strong authentication and access controls in cloud environments.

spot_img

Related articles

Recent articles

Dubai’s Traffic Revamp: New Bridges, Lane Expansions, and Upgrades to Reduce Travel Times

Major Traffic Intersection Upgrade in Dubai: Sheikh Zayed bin Hamdan Al Nahyan Street The Roads and Transport Authority (RTA) of Dubai has embarked on an...

ANGLE Vulnerability Raises Concerns About Browser Security

Critical Security Flaw Discovered in Google’s Chromium Browser Engine A significant security vulnerability in Google’s Chromium browser engine has raised alarms globally, as researchers have...

AI-Driven Phishing Kits Overcome MFA to Steal Credentials at Scale

The Evolution of Phishing Kits: How AI is Changing the Game Cybersecurity researchers have recently identified a new wave of advanced phishing kits that are...

CISA Warns of Critical RCE Vulnerability in Sierra Wireless Routers

Significant Vulnerability Found in Sierra Wireless Routers On December 13, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a warning regarding a critical...