Security News > 2017 > November > AWS S3 Buckets at Risk of "GhostWriter" MiTM Attack

2017-11-06 13:25
GhostWriter: Writable AWS S3 Buckets Could Be Exploited to Overwrite Existing Data and Files, or Upload Malware read more
News URL
Related news
- Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look 'insignificant' (source)
- Ransomware abuses Amazon AWS feature to encrypt S3 buckets (source)
- Attackers are encrypting AWS S3 data without using ransomware (source)
- Week in review: AWS S3 data encrypted without ransomware, data of 15k Fortinet firewalls leaked (source)
- Delivering Malware Through Abandoned Amazon S3 Buckets (source)
- New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution (source)
- New OpenSSH flaws expose SSH servers to MiTM and DoS attacks (source)