Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Ransomware Variants Targeting Amazon S3 Services Leveraging Misconfigurations and Access Controls

New Ransomware Variants Targeting Amazon S3 Services Leveraging Misconfigurations and Access Controls

Posted on November 20, 2025November 20, 2025 By CWS

A brand new wave of ransomware assaults is focusing on cloud storage environments, particularly specializing in Amazon Easy Storage Service (S3) buckets that comprise essential enterprise knowledge.

Not like conventional ransomware that encrypts recordsdata utilizing malicious software program, these assaults exploit weak entry controls and configuration errors in cloud environments to lock organizations out of their very own knowledge.

As extra companies transfer their operations to the cloud, attackers are adapting their strategies, shifting away from on-premises programs to cloud-based assets the place precious info is saved.

These assaults may end up in full knowledge loss, operational disruptions, and vital monetary harm if organizations lack correct backup and restoration programs.

The risk actors behind these campaigns achieve unauthorized entry by stolen credentials, leaked entry keys present in public code repositories, or compromised AWS accounts with extreme permissions.

As soon as inside, they determine susceptible S3 buckets by checking for particular weaknesses akin to disabled versioning, lacking object lock safety, and improper write permissions.

The attackers then proceed to encrypt knowledge utilizing varied encryption methods, delete unique recordsdata, or exfiltrate delicate info earlier than demanding ransom funds.

What makes these assaults notably harmful is their capability to make use of native cloud options to conduct malicious actions whereas remaining hidden from conventional safety monitoring instruments.

Pattern Micro safety researchers recognized 5 distinct ransomware variants that particularly goal S3 storage environments, every utilizing totally different assault strategies to realize knowledge encryption or deletion.

These variants vary from utilizing customer-managed encryption keys with scheduled deletion timelines to leveraging server-side encryption with customer-provided keys that AWS can’t get well.

The researchers documented each noticed assault methods utilized in real-world incidents and potential future assault vectors that organizations ought to put together to defend towards.

Their evaluation offers detailed technical breakdowns of how every variant operates and what safety measures can forestall these assaults.

Assault Mechanism and Technical Execution

The Server-Aspect Encryption with Buyer-Offered Keys (SSE-C) variant represents probably the most harmful assault strategies as a result of it creates completely unrecoverable encrypted knowledge.

On this method, risk actors first achieve write-level entry to sufferer S3 buckets by compromised credentials or leaked IAM roles from public GitHub repositories.

After figuring out goal buckets with out correct protections, attackers provoke encryption by offering a regionally saved AES-256 encryption key by particular HTTP request headers or AWS command-line instruments.

The essential facet of this system is that AWS makes use of the attacker’s encryption key to safe the information however by no means shops the precise key in its programs.

AWS solely logs a Hash-based Message Authentication Code (HMAC) of the encryption key in CloudTrail logs, which can’t be reversed or used to decrypt the protected knowledge.

This implies neither the sufferer group nor AWS assist groups can get well the encrypted info as soon as the attacker completes the encryption course of.

After encrypting all goal recordsdata, the attackers deposit ransom notes within the affected buckets, usually naming them “ransom-note.txt” or related variations, which comprise directions for cost and communication.

Variant 1 assault circulation (Supply – Pattern Micro)

The complete assault may be executed quickly, and since the encryption key exists solely on the attacker’s programs, victims face a everlasting lockout until they pay the ransom or have separate backup copies saved securely.

Configuration settings (Supply – Pattern Micro)

Organizations can shield towards this variant by implementing particular coverage controls that block SSE-C encryption requests on the bucket degree or by organization-wide useful resource management insurance policies.

Safety groups ought to monitor CloudTrail logs for uncommon SSE-C encryption actions and implement insurance policies that deny PutObject requests containing customer-provided encryption algorithm headers, successfully eliminating this assault vector from their cloud environments.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Access, Amazon, Controls, Leveraging, Misconfigurations, Ransomware, Services, Targeting, Variants

Post navigation

Previous Post: TamperedChef Hacking Campaign Leverages Common Apps to Deliver Payloads and Gain Remote Access
Next Post: Doppel Raises $70 Million at $600 Million Valuation

Related Posts

CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere Cyber Security News
Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns Cyber Security News
An Open-Source Tool to See Through Encrypted Traffic in Linux systems An Open-Source Tool to See Through Encrypted Traffic in Linux systems Cyber Security News
New BRAODO Stealer Campaign Abuses GitHub To Host Payloads And Evade Detection  New BRAODO Stealer Campaign Abuses GitHub To Host Payloads And Evade Detection  Cyber Security News
Microsoft Rolls Out Baseline Security Mode for Office, SharePoint, Exchange, Teams, and Entra Microsoft Rolls Out Baseline Security Mode for Office, SharePoint, Exchange, Teams, and Entra Cyber Security News
XenServer VM Tools for Windows Vulnerability Let Attackers Execute Arbitrary Code XenServer VM Tools for Windows Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News