Close Menu
Karachi Chronicle
  • Home
  • AI
  • Business
  • Entertainment
  • Fashion
  • Politics
  • Sports
  • Tech
  • World

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Amazon will face Elon Musk’s Tesla with the robot launch.

US Senators reduce resolutions to block Trump’s global tariff amid economic turmoil

It’s great to see Indian artists perform at Coachella and win a Grammy Award, says AR Rahman

Facebook X (Twitter) Instagram
  • Home
  • About us
  • Advertise
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram Pinterest Vimeo
Karachi Chronicle
  • Home
  • AI
  • Business
  • Entertainment
  • Fashion
  • Politics
  • Sports
  • Tech
  • World
Karachi Chronicle
You are at:Home » New Amazon ransomware attack — “unrecoverable” without payment
Tech

New Amazon ransomware attack — “unrecoverable” without payment

Adnan MaharBy Adnan MaharJanuary 14, 2025No Comments5 Mins Read0 Views
Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


The new Codefinger ransomware poses a high risk to your data.

Getty Images

Updated January 14, 2025: This article was originally published on January 13, and now that the nature of Amazon’s threat is fully clear, its new plan to make ransomware payments illegal Contains analysis from security experts on how cybercrime attacks like this can affect victims. , adds further mitigation advice.

Ransomware is a cybersecurity threat that will never go away. The impact of falling victim to an attack, whether by a group such as the one behind the ongoing Play attack, or by a key player such as LockBit who has returned from the dead, is likely to be the biggest threat to ransomware in 2024. The scope is revealed in a report. Codefinger has been observed targeting users of Amazon Web Services S3 buckets. Here’s what you need to know:

forbesNew Apple iPhone USB-C gets hacked – what users need to knowby davie winder

Ongoing Codefinger ransomware attack targeting Amazon Cloud users

A new ransomware campaign targeting Amazon Web Services users by an attacker known as Codefinger was confirmed in a January 13 threat intelligence report by the Halcyon Threat Research and Intelligence team. The Codefinger attack takes advantage of AWS’s server-side encryption using customer-provided keys (thankfully abbreviated to SSE-C) to encrypt data, and the symmetric AES-C required for decryption. Request payment for 256 keys. “This ransomware campaign is particularly dangerous due to the design of SSE-C, which integrates directly with AWS’s secure cryptographic infrastructure and encrypts data, making recovery impossible without the attacker’s keys. ” warned Halcyon researchers.

Halcyon went so far as to suggest that Codefinger represents a significant evolution in ransomware capabilities, saying, “If it spreads rapidly, it poses a systemic threat to organizations that use AWS S3 for critical data storage. “It’s possible,” he added. I’m not sure I fully agree that the inability to decrypt data without paying for the key is due to evolution, and after all is the foundation on which all ransomware operates, but SSE Using -C is certainly a new approach. “Unlike traditional ransomware, which encrypts files locally or in transit, this attack integrates directly with AWS’s secure encryption infrastructure. “Once encrypted, the attacker’s keys are Without it, recovery is impossible,” the researchers said.

That said, this attack campaign does not exploit any AWS vulnerabilities, but rather relies on the old tactic of obtaining AWS customer account credentials by hook or crook.

“This is a great example of how reusing passwords without two-factor authentication or sticking with easy-to-guess passwords comes back to administrators,” said Darren James, senior product manager at Specops Software. I am. James said this latest ransomware attack could have been avoided by using different passwords on all systems and enabling 2FA, which is as strong and phish-resistant as possible. On the plus side, at least SSE-C is a strong encryption method, but it’s bad when it’s used against the good guys instead of against the good guys. ”

forbesNew Gmail Cyber ​​Attack – Encryption Key Crypto Hacker Attackby davie winder

Amazon Cloud Codefinger ransomware attack flow

Halcyon reports that the attack flow used by Codefinger was as follows:

Identify vulnerable AWS keys using publicly available or previously compromised keys. Encrypt files using SSE-C, leveraging locally generated and stored AES-256 encryption keys. Configure file deletion lifecycle policies and use the S3 Object Lifecycle Management application programming interface to mark these to 7 days to increase the urgency of ransom demands. It stores a ransom note in each affected directory, warning that any changes to account permissions or files will end the negotiation.

Unrecoverable Amazon ransomware highlights the difficulty of making ransom payments illegal

Following news of the UK Home Office’s plans to make ransomware payments to some victims, particularly national infrastructure companies and services, illegal, security experts are voicing their opinions on such a move. Such laws are anything but simple, given that the Amazon attack made recovery impossible without paying a ransom to the incident response table. “The topic of ransomware payments is a hotly debated topic,” said Javvad Malik, head of security awareness at KnowBe4. Almost everyone agrees that they do not want to contribute to sponsored activities.”However, it is very important that the law requires ransom payments to be illegal. “People usually want to do the right thing. No executive organizes themselves to become a victim of ransomware, but when ransomware does occur, there is a lot of pressure from shareholders, customers and governments. Even if pressure starts to mount, they will try to pay the ransom unless an alternative is provided. In this regard, governments should work with organizations to minimize the disruption caused by ransomware and, at the very least, how to prevent, detect, respond to, and recover from ransomware attacks. should provide extensive guidance on the

Amazon statement regarding Codefinger ransomware attack

An Amazon Web Services spokesperson said: “AWS helps customers protect their cloud resources through a shared responsibility model. When AWS becomes aware of exposed keys, it notifies affected customers and ensures that all reporting of exposed keys is done. We quickly investigate and take necessary actions, including enforcing quarantine policies to minimize risk to our customers without disrupting their IT environments. As always, if you suspect your credentials may have been compromised, you can start by following the steps outlined in this post. You can contact AWS Support if you have questions or concerns about the security of your account.

forbesGay Femboy’s zero-day router attack is underway — what you need to knowby davie winder



Source link

Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
Previous ArticleGreek Air Force receives last Rafale fighter jet
Next Article Self-learning AI reveals 2025 NFL divisional round picks for NFL spread, over-under, and money line
Adnan Mahar
  • Website

Adnan is a passionate doctor from Pakistan with a keen interest in exploring the world of politics, sports, and international affairs. As an avid reader and lifelong learner, he is deeply committed to sharing insights, perspectives, and thought-provoking ideas. His journey combines a love for knowledge with an analytical approach to current events, aiming to inspire meaningful conversations and broaden understanding across a wide range of topics.

Related Posts

Amazon will face Elon Musk’s Tesla with the robot launch.

May 7, 2025

This stretchy battery is healed after being cut in half

April 21, 2025

Apple fixes two zero-days exploited in targeted iPhone attacks

April 16, 2025
Leave A Reply Cancel Reply

Top Posts

President Trump’s SEC nominee Paul Atkins marries multi-billion dollar roof fortune

December 14, 202493 Views

Alice Munro’s Passive Voice | New Yorker

December 23, 202451 Views

2025 Best Actress Oscar Predictions

December 12, 202434 Views

20 Most Anticipated Sex Movies of 2025

January 22, 202527 Views
Don't Miss
AI April 14, 2025

Google, Nvidia invests in AI startup Safe Superintelligence, co-founder of Openai Ilya Sutskever

Alphabet and Nvidia are investing in Safe Superintelligence (SSI), a stealth mode AI startup co-founded…

This $30 billion AI startup can be very strange by a man who said that neural networks may already be aware of it

As Deepseek and ChatGpt Surge, is Delhi behind?

Openai’s Sam Altman reveals his daily use of ChatGpt, and that’s not what you think

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Karachi Chronicle, your go-to source for the latest and most insightful updates across a range of topics that matter most in today’s fast-paced world. We are dedicated to delivering timely, accurate, and engaging content that covers a variety of subjects including Sports, Politics, World Affairs, Entertainment, and the ever-evolving field of Artificial Intelligence.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Amazon will face Elon Musk’s Tesla with the robot launch.

US Senators reduce resolutions to block Trump’s global tariff amid economic turmoil

It’s great to see Indian artists perform at Coachella and win a Grammy Award, says AR Rahman

Most Popular

ATUA AI (TUA) develops cutting-edge AI infrastructure to optimize distributed operations

October 11, 20020 Views

10 things you should never say to an AI chatbot

November 10, 20040 Views

Character.AI faces lawsuit over child safety concerns

December 12, 20050 Views
© 2025 karachichronicle. Designed by karachichronicle.
  • Home
  • About us
  • Advertise
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.