Supply Chain Attack: Abandoned S3 Buckets Used for Malicious Payloads

Previously, threat actors took over misconfigured databases to demand ransom, but now there has been a change in their tactics. Hijacked S3 buckets or hosting sources have become a real threat, as adversaries can exploit them for “data theft and intrusion,” according to Checkmarx researcher and software engineer Guy Nachshon in his blog post published on June 15th.

Source: HackRead

 


Date:

Categorie(s):