Close Menu
Karachi Chronicle
  • Home
  • AI
  • Business
  • Entertainment
  • Fashion
  • Politics
  • Sports
  • Tech
  • World

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

The world’s largest air force with the F-35 fleet in 2025

AI systems learn from many types of scientific information and run experiments to discover new materials | MIT News

Among the most troublesome relationships in healthcare AI

Facebook X (Twitter) Instagram
  • Home
  • About us
  • Advertise
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram Pinterest Vimeo
Karachi Chronicle
  • Home
  • AI
  • Business
  • Entertainment
  • Fashion
  • Politics
  • Sports
  • Tech
  • World
Karachi Chronicle
You are at:Home » New Amazon ransomware attack — “unrecoverable” without payment
Tech

New Amazon ransomware attack — “unrecoverable” without payment

Adnan MaharBy Adnan MaharJanuary 15, 2025No Comments8 Mins Read0 Views
Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


The new Codefinger ransomware poses a high risk to your data.

Getty Images

Update 15 January 2025: This article was originally published on 13 January New UK government plans to make ransomware payments illegal as nature of Amazon threat becomes fully clear Contains analysis from security experts on how it can affect victims. In addition to these cyber crimes, we also provide further mitigation advice for victims of these attacks.

Ransomware is a cybersecurity threat that will never go away. The impact of falling victim to an attack, whether by a group such as the one behind the ongoing Play attack, or by a key player such as LockBit who has returned from the dead, is likely to be the biggest threat to ransomware in 2024. The scope is revealed in a report. Codefinger has been observed targeting users of Amazon Web Services S3 buckets. Here’s what you need to know:

forbesMillions of users who sign in with Google are warned about data theft hacking attackby davie winder

Ongoing Codefinger ransomware attack targeting Amazon Cloud users

A new ransomware campaign targeting Amazon Web Services users by an attacker known as Codefinger was confirmed in a January 13 threat intelligence report by the Halcyon Threat Research and Intelligence team. The Codefinger attack takes advantage of AWS’s server-side encryption using a customer-provided key (usually abbreviated to SSE-C, thankfully) to encrypt data, and the symmetric AES-C required for decryption. Request payment for 256 keys. “This ransomware campaign is particularly dangerous due to the design of SSE-C, which integrates directly with AWS’s secure cryptographic infrastructure and encrypts data, making recovery impossible without the attacker’s keys. ” warned Halcyon researchers.

Halcyon went so far as to suggest that Codefinger represents a significant evolution in ransomware capabilities, saying, “If it spreads rapidly, it poses a systemic threat to organizations that use AWS S3 for critical data storage. It is possible,” he added. I’m not sure I fully agree that the inability to decrypt data without paying for the key is due to evolution, and after all is the foundation on which all ransomware operates, but SSE Using -C is certainly a new approach. “Unlike traditional ransomware, which encrypts files locally or in transit, this attack integrates directly with AWS’s secure encryption infrastructure. “Once encrypted, the attacker’s keys are Without it, recovery is impossible,” the researchers said.

That said, this attack campaign does not exploit any AWS vulnerabilities, but rather relies on the old tactic of obtaining AWS customer account credentials by hook or crook.

“This is a great example of how reusing passwords without two-factor authentication or sticking with easy-to-guess passwords comes back to administrators,” said Darren James, senior product manager at Specops Software. I am. James said this latest ransomware attack could have been avoided by using different passwords on all systems and enabling 2FA, which is as strong and phish-resistant as possible. On the plus side, at least SSE-C is a strong encryption method, but it’s bad when it’s used against the good guys instead of against the good guys. ”

forbesCritical new warning for Microsoft Windows as three zero-day attacks are in progressby davie winder

Amazon Cloud Codefinger ransomware attack flow

Halcyon reports that the attack flow used by Codefinger was as follows:

Identify vulnerable AWS keys using publicly available or previously compromised keys. Encrypt files using SSE-C, leveraging locally generated and stored AES-256 encryption keys. Configure file deletion lifecycle policies and use the S3 Object Lifecycle Management application programming interface to mark these to 7 days to increase the urgency of ransom demands. It stores a ransom note in each affected directory, warning that any changes to account permissions or files will end the negotiation.

Unrecoverable Amazon ransomware highlights the illegality of ransom payments

Following news of the UK Home Office’s plans to make ransomware payments to some victims, particularly national infrastructure companies and services, illegal, security experts are voicing their opinions on such a move. Such laws are anything but simple, given that the Amazon attack made recovery impossible without paying a ransom to the incident response table. “The topic of ransomware payments is a hotly debated topic,” said Javvad Malik, head of security awareness at KnowBe4. Almost everyone agrees that they do not want to contribute to sponsored activities.”However, it is very important that the law requires ransom payments to be illegal. “People usually want to do the right thing. No executive organizes themselves to become a victim of ransomware, but when ransomware does occur, there is a lot of pressure from shareholders, customers and governments. Even if pressure starts to mount, pay the ransom unless an alternative is provided Malik said that to minimize the disruption caused by ransomware, governments should work together with organizations to “at least prevent, detect, respond to, and recover from ransomware attacks.” “We need to provide extensive guidance on how to do so.”

Dr. Darren Williams, CEO and founder of BlackFog, said that ransomware gangs, like most criminals, are “very profit-motivated and tend to gravitate toward targets that are more likely to pay them.” There is,” he pointed out. As Williams said, payment is no guarantee. “At the end of the day, you are negotiating with criminals who are unlikely to honor their end of the deal, and in many cases they will do more than target and leak stolen data for a while. The same victims occurred.”

forbesRaspberry Pi Sensitive Data Hacking Attack – What You Need to Knowby davie winder

Jochen Michels, head of European communications at Kaspersky Lab, argued that paying ransoms does perpetuate the cycle of crime, but there are many no-win scenarios to consider. “We recommend against paying a ransom to cybercriminals, as it perpetuates the cycle of crime and provides no guarantee of resolution,” Michels said, adding that Kaspersky’s “Ransom It added that safeguarding industry initiatives such as the “None” initiative are being implemented. Provide victims with a solution to recover data without bowing to criminal demands. Unfortunately, these efforts to provide free ransomware decryption tools are of little use to victims of Amazon’s “irrecoverable” ransomware attacks due to the use of SSE-C keys. No wonder, then, that Michels said, “In certain high-risk scenarios, the decision to pay or not pay becomes much more complex.” This highlights the urgent need for government safeguards to support victims facing no-win situations, Michels said. “This could include financial support for the effort, access to decryption tools, and even compensation if payment of the ransom is deemed exclusive.” It’s a viable option. ”

Meanwhile, Jamie Akhtar, co-founder and CEO of Cybersmart, also said that while the UK government’s sentiments towards the proposed policy were to be applauded, caution needed to be taken. “This approach only works if the organization has cybersecurity measures in place, such as regular backups and properly siled data, so it can bounce back quickly even if the ransom is not paid. ” warned Akhtar. Of course, many organizations do not have these measures in place, or at least not to the extent necessary, and as a result are left with little choice but to pay the ransom or face reputational and financial ruin. “Such steps need to be taken in conjunction with broader efforts to improve cybersecurity practices,” Akhtar concluded. ”

However, Mike Kaiser, SailPoint’s director of strategy and standards, said: “Ransom payments should be prohibited. An increase in payments means a corresponding increase in malicious activity.” I stated it more clearly. But as Kaiser acknowledged, everything is not as simple as it sounds. “As soon as a law is passed prohibiting the payment of ransoms, an underground market may emerge, resulting in a hidden economic system.” So who is responsible for violating the law? Kaiser questioned, “Is it the corporation’s responsibility or the security personnel’s responsibility?”

Amazon statement regarding Codefinger ransomware attack

An Amazon Web Services spokesperson said: “AWS helps customers protect their cloud resources through a shared responsibility model. When AWS becomes aware of exposed keys, it notifies affected customers and ensures that all reporting of exposed keys is done. We quickly investigate and take necessary actions, including enforcing quarantine policies to minimize risk to our customers without disrupting their IT environments. As always, if you suspect that your credentials may have been compromised, you can start by following the steps outlined in this post. You can contact AWS Support if you have questions or concerns about the security of your account.

forbesGay Femboy’s zero-day router attack is underway — what you need to knowby davie winder



Source link

Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
Previous ArticleCaptain America: Brave New World is one of the shortest Marvel Cinematic Universe movies
Next Article France, Telecom News, ET Telecom
Adnan Mahar
  • Website

Adnan is a passionate doctor from Pakistan with a keen interest in exploring the world of politics, sports, and international affairs. As an avid reader and lifelong learner, he is deeply committed to sharing insights, perspectives, and thought-provoking ideas. His journey combines a love for knowledge with an analytical approach to current events, aiming to inspire meaningful conversations and broaden understanding across a wide range of topics.

Related Posts

Googleबनी$ 3

September 16, 2025

Tesla engineers will resign in eight years. He points out CEO Elon Musk as the main reason, accusing him of “liing to the public and manipulating him…”

September 12, 2025

Ant Group unveils its own Tesla Optimus competitor, R1 humanoid robot

September 11, 2025
Leave A Reply Cancel Reply

Top Posts

20 Most Anticipated Sex Movies of 2025

January 22, 2025458 Views

President Trump’s SEC nominee Paul Atkins marries multi-billion dollar roof fortune

December 14, 2024122 Views

How to tell the difference between fake and genuine Adidas Sambas

December 26, 202486 Views

Alice Munro’s Passive Voice | New Yorker

December 23, 202474 Views
Don't Miss
AI September 25, 2025

AI systems learn from many types of scientific information and run experiments to discover new materials | MIT News

Machine learning models can speed up discovery of new materials by making predictions and proposing…

Among the most troublesome relationships in healthcare AI

Does access to AI become a fundamental human right? Sam Altman says, “Everyone would want…”

Google’s Gemini AI is on TV

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Karachi Chronicle, your go-to source for the latest and most insightful updates across a range of topics that matter most in today’s fast-paced world. We are dedicated to delivering timely, accurate, and engaging content that covers a variety of subjects including Sports, Politics, World Affairs, Entertainment, and the ever-evolving field of Artificial Intelligence.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The world’s largest air force with the F-35 fleet in 2025

AI systems learn from many types of scientific information and run experiments to discover new materials | MIT News

Among the most troublesome relationships in healthcare AI

Most Popular

10 things you should never say to an AI chatbot

November 10, 20040 Views

Character.AI faces lawsuit over child safety concerns

December 12, 20050 Views

Analyst warns Salesforce investors about AI agent optimism

July 1, 20070 Views
© 2025 karachichronicle. Designed by karachichronicle.
  • Home
  • About us
  • Advertise
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.