├── SSRF.md ├── USAGES.md ├── KEYLEAKS.md ├── DISCLOSURE.md ├── ACTORS.md ├── REPORTS.md ├── LICENSE └── README.md /SSRF.md: -------------------------------------------------------------------------------- 1 | ### Catalog of AWS Exploits via SSRF 2 | 3 | [Server-side request forgery](https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/) is a class of attack that is not cloud or AWS specific. However, the existence of cloud metadata services, such as [IMDS](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html) in AWS, have historically allowed for a substantial straightforward impact when SSRF is achieved on a cloud hosted application. For that reason, we include this list of SSRF attacks against AWS environments. 4 | 5 | * October 2014 - [Prezi Got Pwned: A Tale of Responsible Disclosure](https://engineering.prezi.com/prezi-got-pwned-a-tale-of-responsible-disclosure-ccdc71bb6dd1) 6 | * [Bypassing SSRF Protection to Exfiltrate AWS Metadata from LarkSuite](https://sirleeroyjenkins.medium.com/bypassing-ssrf-protection-to-exfiltrate-aws-metadata-from-larksuite-bf99a3599462) 7 | * [ESEA Server-Side Request Forgery and Querying AWS Meta Data](https://buer.haus/2016/04/18/esea-server-side-request-forgery-and-querying-aws-meta-data/) 8 | * [A pair of Plotly bugs: Stored XSS and AWS Metadata SSRF](https://web.archive.org/web/20170527104436/https://ysx.me.uk/a-pair-of-plotly-bugs-stored-xss-and-aws-metadata-ssrf/) 9 | * [Dropbox - Full Response SSRF via Google Drive](https://github.com/httpvoid/writeups/blob/main/Hacking-Google-Drive-Integrations.md#dropboxs-full-read-ssrf) 10 | * [Mandiant - Old Services, New Tricks: Cloud Metadata Abuse by UNC2903](https://www.mandiant.com/resources/blog/cloud-metadata-abuse-unc2903) 11 | * [SSRF leads to access AWS metadata.](https://infosecwriteups.com/ssrf-leads-to-access-aws-metadata-21952c220aeb) 12 | * [Escalating SSRF to RCE](https://sanderwind.medium.com/escalating-ssrf-to-rce-7c0147371c40) 13 | * [SSRF Leads To AWS Metadata Exposure](https://systemweakness.com/ssrf-leads-to-aws-metadata-exposure-8b4c3424755b) 14 | * [How I discovered an SSRF leading to AWS Metadata Leakage](https://techkranti.com/ssrf-aws-metadata-leakage/) 15 | * [Exploitation of an SSRF vulnerability against EC2 IMDSv2](https://www.yassineaboukir.com/blog/exploitation-of-an-SSRF-vulnerability-against-EC2-IMDSv2/) 16 | * [Mozilla - AWS SSRF to Pull AWS Metadata and Keys](https://bugzilla.mozilla.org/show_bug.cgi?id=1550366) 17 | * [Full read SSRF in www.evernote.com that can leak aws metadata and local file inclusion](https://hackerone.com/reports/1189367) | 18 | * [SSRF allows reading AWS EC2 metadata using "readapi" variable in Streamlabs Cloudbot](https://hackerone.com/reports/1108418) 19 | * [Server Side Request Forgery (SSRF) at app.hellosign.com leads to AWS private keys disclosure](https://hackerone.com/reports/923132) 20 | * [SSRF via Office file thumbnails](https://hackerone.com/reports/671935) 21 | * [Getting AWS creds via SSRF on rss.app](https://ruse.tech/blogs/rss-app-ssrf) 22 | * [AWS takeover through SSRF in JavaScript](https://10degres.net/aws-takeover-through-ssrf-in-javascript/) 23 | * [Yahoo Small Business (Luminate) and the Not-So-Secret Keys](https://dos.sh/blog/2017/6/21/yahoo-small-business-luminate-and-the-not-so-secret-keys) 24 | * [Bug Bounty Story: Escalating SSRF to RCE on AWS](https://hg8.sh/posts/bugbounty/ssrf-to-rce-aws/) 25 | * [A Nifty SSRF Bug Bounty Write Up](https://hack-ed.net/2017/11/07/a-nifty-ssrf-bug-bounty-write-up/) 26 | * [Mozilla Hubs Cloud: cloud api credentials exposure](https://bugzilla.mozilla.org/show_bug.cgi?id=1707898) 27 | * [Lacework Labs: New surge in AWS credential compromises tied to Grafana SSRF attacks](https://www.lacework.com/blog/new-surge-in-aws-credential-compromises-tied-to-grafana-ssrf-attacks/) 28 | * [EC2 User-data to RCE](https://medium.com/@xploiterd/ec2-user-data-to-rce-f601264a75c2) 29 | * [Server Side Request Forgery (SSRF) via Analytics Reports](https://hackerone.com/reports/2262382) 30 | * [SSRF to read AWS metaData at https://█████/ \[HtUS\]](https://hackerone.com/reports/1624140) 31 | * [SSRF on █████████ Allowing internal server data access](https://hackerone.com/reports/326040) 32 | * [The Unusual Case of Status code- 301 Redirection to AWS Security Credentials Compromise](https://logicbomb.medium.com/the-unusual-case-of-open-redirection-to-aws-security-credentials-compromise-59acc312f02b) 33 | 34 | For more about this attack, please see [Hacking the Cloud - Steal EC2 Metadata Credentials via SSRF](https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/) 35 | -------------------------------------------------------------------------------- /USAGES.md: -------------------------------------------------------------------------------- 1 | # A list of appearances of aws-customer-security-incidents 2 | 3 | The initial data was collected for a talk at BSidesCT 2020: _Learning from AWS (Customer) Security Incidents_ [slides here](https://speakerdeck.com/ramimac/learning-from-aws-customer-security-incidents) 4 | A follow up talk was given at OWASP DevSlop in May 2022. [video](https://www.youtube.com/watch?v=JBUgAXvcObU), [slides](https://speakerdeck.com/ramimac/learning-from-aws-customer-security-incidents-2022) 5 | 6 | ## Talks 7 | 8 | * Andoni Alonso, Bsides Málaga 2025: [The Cloud Is Just Someone Else's Computer, But It's Still Your Problem](https://github.com/unicrons/.github/blob/main/slides/The%20Cloud%20Is%20Just%20Someone%20Else's%20Computer%2C%20But%20It's%20Still%20Your%20Problem%20%40%20Bsides%20Malaga%202025.pdf) 9 | * Abhinav Singh, RSAC 2024: [Blueprint For Data Defense in the Public Cloud: Strategies & Playbooks](https://static.rainfocus.com/rsac/us24/sess/1697499635209001eAXa/finalwebsite/2024_USA24_LAB1-R01_01_Blueprint-for-Data-Defense-in-the-Public-Cloud_1713894543832001YiEZ.pdf) 10 | * Christophe Tafani-Dereeper, Insomni'Hack 2024: [Abusing Misconfigured OIDC Authentication In Cloud Environments](https://download.scrt.ch/insomnihack/ins24-slides/Insomni%27Hack%202024_%20Abusing%20misconfigured%20OIDC%20authentication%20in%20cloud%20environments.pdf), [video](https://www.youtube.com/watch?v=r68fyFhkeV0) 11 | * Nick Jones, AWS Meetup Copenhagen June 2023: [Avoiding Security Breaches in AWS](https://www.nojones.net/assets/slides/withsecure_avoiding-security-breaches-in-aws_2023-06-01%20copy.pdf) 12 | * Nick Jones, Telia Digital Hub 2023: [How to Avoid Security Breaches in the Cloud](https://www.nojones.net/assets/slides/withsecure_avoiding-security-breaches-in-the-cloud-2023-11-09.pdf) 13 | * Christopher Doman, SANS DFIR Summit 2023: [A New Perspective on Resource-Level Cloud Forensics](https://www.slideshare.net/slideshow/a-new-perspective-on-resourcelevel-cloud-forensics/259640162) 14 | PAUL SCHWARZENBERGER, DevSecOps London October 2023: [ROAD TO IAM ZERO](https://www.celidor.co/uploads/2/8/8/5/28854267/road_to_iam_zero.pdf) 15 | * Rami McCarthy, OWASP DevSlop: [Learning from AWS (Customer) Security Incidents [2022]](https://speakerdeck.com/ramimac/learning-from-aws-customer-security-incidents-2022), [video](https://www.youtube.com/watch?v=JBUgAXvcObU) 16 | * Chandrapal Badshah, 2022: [Automating Cloud Security AWS Edition](https://badshah.io/talks/slides/2022-10-12-Automating-Cloud-Security-AWS.pdf) 17 | * Christophe Tafani-Dereeper, SANS Now2Cyber Summit 2022: [Fantastic AWS Hacks and Where to Find Them](https://docs.google.com/presentation/d/1WIg9Zctp7emuEgnehArUEwvkHSpC6JOi7ojejMX6L_s/edit#slide=id.g11aa1ea64ff_8_0) 18 | * Boik Su, HitCon 2021: [空降危機:雲端攻防二三事](https://hitcon.org/2021/en/agenda/d90156b6-1714-4162-804a-3f9a951c213b/%E7%A9%BA%E9%99%8D%E5%8D%B1%E6%A9%9F%EF%BC%9A%E9%9B%B2%E7%AB%AF%E6%94%BB%E9%98%B2%E4%BA%8C%E4%B8%89%E4%BA%8B.pdf) 19 | * Rami McCarthy, BSidesCT 2020: [Learning from AWS (Customer) Security Incidents](https://speakerdeck.com/ramimac/learning-from-aws-customer-security-incidents) 20 | 21 | ## Podcasts 22 | 23 | * [NoLimitSecu Episode #408](https://www.nolimitsecu.fr/securite-du-cloud/) 24 | * Cloud Security Podcast: [Real-World Cloud Security Challenges and Solutions Explained for 2024](https://www.youtube.com/watch?v=jFjxhNaePFA) 25 | 26 | ## Blogs 27 | 28 | * Soteria Cybersecurity, 2024: [You Are Penetration Testing Your Cloud Wrong!](https://blog.soteria.io/you-are-penetration-testing-your-cloud-wrong-a351cb80e281) 29 | * CloudYali, 2024: [How to Monitor AWS Root Users at Scale: Best Practices](https://www.cloudyali.io/blogs/how-to-monitor-aws-iam-root-users-at-scale-best-practices) 30 | * Chris Farris, 2023: [breaches.cloud](https://www.breaches.cloud/news/welcome/) 31 | * Nick Jones, 2022: [A Review of the AWS Security Model](https://www.nojones.net/posts/a-review-of-the-aws-security-maturity-model) 32 | * Datadog, 2022: [A retrospective on public cloud breaches of 2022, with Rami McCarthy and Houston Hopkins](https://securitylabs.datadoghq.com/articles/public-cloud-breaches-2022-mccarthy-hopkins/) 33 | * Christophe Tafani-Dereeper, 2021: [Cloud Security Breaches and Vulnerabilities: 2021 in Review](https://blog.christophetd.fr/cloud-security-breaches-and-vulnerabilities-2021-in-review/) 34 | 35 | ## Research & Whitepapers 36 | 37 | * CSA: [Understanding Cloud Attack Vectors](https://cloudsecurityalliance.org/artifacts/understanding-cloud-attack-vectors) 2023 38 | * RAND: [Securing AI Model Weights](https://www.rand.org/content/dam/rand/pubs/research_reports/RRA2800/RRA2849-1/RAND_RRA2849-1.pdf) 39 | 40 | -------------------------------------------------------------------------------- /KEYLEAKS.md: -------------------------------------------------------------------------------- 1 | ## Key Leaks: historic research identifying bulk AWS Secrets 2 | 3 | | Date | Leak | Reference | 4 | | ------------- | ------------- | ------------- | 5 | | 2012, March | Secrets in public AMIs | [A Security Analysis of Amazon’s Elastic Compute Cloud Service](https://seclab.nu/static/publications/sac2012ec2.pdf) | 6 | | 2019, February | 4,648 unique AWS Access Key IDs in Github | [How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories](https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_04B-3_Meli_paper.pdf) | 7 | | 2019, August | 50 Access Keys in public EBS volumes | [More Keys than a Piano: Finding Secrets in Publicly Exposed EBS Volumes](https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Ben-Morris-More-Keys-Than-A-Piano-Finding-Secrets-In-Publicly-Exposed-Ebs-Volumes.pdf) | 8 | | 2020, September | ~25,000 AWS Access Keys exposed via Github | [Reliaquest - Access Keys Exposed: More Than 40% Are For Database Stores](https://www.reliaquest.com/blog/access-keys-exposed-more-than-40-are-for-database-stores/) | 9 | | 2021, January | AWS Access Tokens in Public AMI Images | [Hunting for Sensitive Data in Public Amazon Images (AMI)](https://blog.lethalbit.com/hunting-for-sensitive-data-in-public-amazon-images-ami/) | 10 | | 2021, November | 1,500+ AWS credentials in Docker Hub images | [Scanning Millions of Publicly Exposed Docker Containers – Thousands of Secrets Leaked (Wave 5)](https://redhuntlabs.com/blog/scanning-millions-of-publicly-exposed-docker-containers-thousands-of-secrets-leaked/) | 11 | | 2022, September | 1,859 Android and iOS apps with AWS credentials | [Mobile App Supply Chain Vulnerabilities Could Endanger Sensitive Business Information](https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/mobile-supply-chain-aws) | 12 | | 2023, July | 1,213 AWS Secrets in Docker images | [Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact](https://arxiv.org/pdf/2307.03958.pdf) | 13 | | 2023, August | Over-privileged cloud credentials in 1,667 mobile applications | [Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference](https://www.usenix.org/system/files/usenixsecurity23-wang-xueqiang-karma.pdf) | 14 | | 2023, September | 11-12 AWS credentials in `.git` of Alexa Top 1M | [4,500 of the Top 1 Million Websites Leaked Source Code, Secrets](https://trufflesecurity.com/blog/4500-of-the-top-1-million-websites-leaked-source-code-secrets/) | 15 | | 2023, October | over 140 unique active, plaintext credentials to third-party services like OpenAI, AWS, GitHub, and others in Kaggle data | [Analyzing the Security of Machine Learning Research Code](https://developer.nvidia.com/blog/analyzing-the-security-of-machine-learning-research-code/) | 16 | | 2023, November | 2,897 AWS Access Tokens in StackExchange dataset | [I analyzed stackoverflow](https://matan-h.com/analyze-stackoverflow) | 17 | | 2024, April | 3 AWS Credentials leaked in public Gists in a seven day period | [Do Secrets Leak on Public GitHub Gists in 2024?](https://trufflesecurity.com/blog/do-secrets-leak-on-public-github-gists-in-2024) | 18 | | 2024, April | 111 valid AWS keys leaks, 14 belonging to root users in public ECR Registry images | [Securing the Cloud: Detecting and Reporting Sensitive Data in ECR Images](https://badshah.io/talks/slides/2024-04-27-Detecting-And-Reporting-Sensitive-Data-In-ECR.pdf) | 19 | | 2024, April | AWS credentials leaked on Postman’s Public API Network | [(The) Postman Carries Lots of Secrets](https://trufflesecurity.com/blog/postman-carries-lots-of-secrets) | 20 | | 2024, May | over 200 valid AWS credentials in Public AMI Images | [AWS CloudQuarry: Digging for Secrets in Public AMIs](https://securitycafe.ro/2024/05/08/aws-cloudquarry-digging-for-secrets-in-public-amis/) | 21 | | 2024, May | Bitbucket secured variables leak AWS keys in plain text through artifact objects | [Holes in Your Bitbucket: Why Your CI/CD Pipeline Is Leaking Secrets](https://cloud.google.com/blog/topics/threat-intelligence/bitbucket-pipeline-leaking-secrets/) | 22 | | 2024, July | Leaked Secrets in Public Jenkins Logs, including 6 AWS keys | [Leaked Secrets in Public Jenkins Logs](https://trufflesecurity.com/blog/leaked-secrets-in-public-jenkins-logs) | 23 | | 2024, August | Leaked secrets via Virustotal's Retrohunt, Passive DNS "more than 78,000 dangling cloud resources linked to 66,000 apex domains" | [Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All](https://www.wired.com/story/secret-hunting-bill-demirkapi/), [Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale](https://defcon.org/html/defcon-32/dc-32-speakers.html#54509) 24 | | 2024, August | 1,185 leaked AWS Access Keys in exposed `.env` | [Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments](https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/) 25 | | 2024, October | Hardcoded AWS Access Keys in mobile apps | [Exposing the Danger Within: Hardcoded Cloud Credentials in Popular Mobile Apps](https://www.security.com/threat-intelligence/exposing-danger-within-hardcoded-cloud-credentials-popular-mobile-apps) 26 | | 2024, October | Numerous leaked credentials scraped from exposed `.git` configurations | [EMERALDWHALE: 15k Cloud Credentials Stolen in Operation Targeting Exposed Git Config Files](https://sysdig.com/blog/emeraldwhale/) 27 | | 2024, December | 1,526 leaked AWS credentials via environment files (.env), configuration files, exposed git repositories (.git), etc. | [From Vulnerabilities to Breaches: The Shiny Nemesis Cyber Operation](https://www.vpnmentor.com/news/shiny-nemesis-report/) 28 | | 2025, January | 4 valid AWS credentials in Firefox Extensions | [Mining All 30,000 Firefox Extensions for Goodies & Baddies](https://harrisonm.com/blog/mining-firefox-extensions) 29 | | 2025, February | Multiple AWS Access Keys in Common Crawl data set | [Research finds 12,000 ‘Live’ API Keys and Passwords in DeepSeek's Training Data](https://trufflesecurity.com/blog/research-finds-12-000-live-api-keys-and-passwords-in-deepseek-s-training-data) | 30 | | 2025, March | over 7,000 valid AWS credentials exposed on DockerHub | [Fresh From The Docks: Uncovering 100,000 Valid Secrets in DockerHub](https://blog.gitguardian.com/fresh-from-the-docks-uncovering-100-000-valid-secrets-in-dockerhub/) | 31 | | 2025, April | 228 AWS access keys in Postman Collections | [Leaky Postman Collections Reveal Thousands of Secrets | Wave 14 | Project Resonance](https://redhuntlabs.com/blog/leaky-postman-collections-reveal-thousands-of-secrets-wave14-project-resonance/) | 32 | | 2025, July | 130 AWS Access Keys in Dangling "Oops" Commits | [How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets](https://trufflesecurity.com/blog/guest-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets) | 33 | | 2025, July | 27 AWS Access Keys in DockerHub images | [Stop the Leak: Scanning Containers for Exposed Secrets](https://www.binarly.io/blog/stop-the-leak-scanning-containers-for-exposed-secrets) | 34 | 35 | 36 | 37 | -------------------------------------------------------------------------------- /DISCLOSURE.md: -------------------------------------------------------------------------------- 1 | ## Disclosure (responsible, coordinated, public) 2 | 3 | This is a partial directory of incidents impacting individuals, or disclosed attack attempts or chains with no incident. 4 | 5 | We have not compiled the periodic reports of cryptomining due to compromised credentials. [1](https://vertis.io/2013/12/16/unauthorised-litecoin-mining/) [2](https://readwrite.com/amazon-web-services-hack-bitcoin-miners-github/) [3](http://www.nvenky.in/2014/03/bitcoin-mining-closed-my-aws-account.html) 6 | 7 | 8 | | Date | Vulnerability | Reference | 9 | | ------------- | ------------- | ------------- | 10 | | 2014, Dec | Credentials leaked in Github | [My AWS Account Got Compromised](https://xingwu.me/2014/12/10/My-AWS-Account-Got-Compromised/) | 11 | | 2016, Dec | Credentials leaked in npm package | [Security Incident - AWS S3 Access Key Exposure](https://blog.emberjs.com/security-incident-aws-s3-key-exposure/) | 12 | | 2019, May | Credentials leaked in exposed GitLab instance | [Samsung spilled SmartThings app source code and secret keys](https://techcrunch.com/2019/05/08/samsung-source-code-leak/) | 13 | | 2019, May | Credentials leaked in Github | [AWS secret key and NPM token leaked in MEW GitHub repos](https://github.com/Ravirajrao/HackerOne-Reports/blob/master/%23549341%20AWS%20secret%20key%20and%20NPM%20token%20leaked%20in%20MEW%20GitHub%20repos.pdf) | 14 | | 2020, Feb | Credentials leaked in repository | [Access to Glassdoor's Infra (AWS) and BitBucket account through leaked repo](https://hackerone.com/reports/801531) | 15 | | 2021, Jan | Analyzed 3,000 documents, found 1 public s3 bucket with PIIes | [The Need to Protect Public AWS SSM Documents](https://research.checkpoint.com/2021/the-need-to-protect-public-aws-ssm-documents-what-the-research-shows/) | 16 | | 2021, Apr | Subdomain takeover, deleted EC2 instance | [Subdomain takeover of www2.growasyouplan.com](https://hackerone.com/reports/1179193) | 17 | | 2021, Oct | AWS Creds hardcoded in MSI | [Hardcoded AWS credentials in ███████.msi](https://hackerone.com/reports/1368690) | 18 | | 2021, Nov | Potential subdomain takeover, dangling CNAME | [Possible Domain Takeover on AWS Instance](https://hackerone.com/reports/1390782) | 19 | | 2021, Nov | Subdomain takeover, deleted S3 bucket | [Subdomain takeover of images.crossinstall.com](https://hackerone.com/reports/1406335) | 20 | | 2021, Dec | Account takeover via Cognito user email change | [Flickr Account Takeover using AWS Cognito API](https://hackerone.com/reports/1342088) | 21 | | 2022, Jan | NoSQL-Injection discloses discloses S3 File Upload URLs | [NoSQL-Injection discloses S3 File Upload URLs](https://hackerone.com/reports/1458020) | 22 | | 2022, May | Malicious update to `ctx` Python library | [Malicious Python library CTX removed from PyPI repo](https://portswigger.net/daily-swig/malicious-python-library-ctx-removed-from-pypi-repo) | 23 | | 2022, Oct | Subdomain takeover, deleted S3 bucket | [Subdomain takeover at http://test.www.midigator.com](https://hackerone.com/reports/1718371) | 24 | | 2022, Nov | AWS credentials in string constant in public python package | [Infosys leaked FullAdminAccess AWS keys on PyPi for over a year](https://tomforb.es/infosys-leaked-fulladminaccess-aws-keys-on-pypi-for-over-a-year/) | 25 | | 2022, Nov | Public RDS snapshots | [Oops, I Leaked It Again](https://www.mitiga.io/blog/how-mitiga-found-pii-in-exposed-amazon-rds-snapshots) | 26 | | 2022, Sep | AWS credentials leaked in code repository | [Shiba Inu cloud credentials leaked on a public repository!](v) | 27 | | 2022, Dec | Lack of forced verification on email update in AWS Cognito | [Account Takeover Due to Cognito Misconfiguration Earns Me €xxxx](https://medium.com/@mukundbhuva/account-takeover-due-to-cognito-misconfiguration-earns-me-xxxx-3a7b8bb9a619) | 28 | | 2023, Jan | AWS credentials found in 57 PyPi packages | [I scanned every package on PyPi and found 57 live AWS keys](https://tomforb.es/i-scanned-every-package-on-pypi-and-found-57-live-aws-keys/) | 29 | | 2023, Jan | AWS credentials disclosed in client-side source | [Owning half of a government assets through AWS](https://crypt0g30rgy.github.io/post/AWSTakeover) | 30 | | 2023, Feb | RCE in Lambda function with access to AWS credentials via /proc/*/environ | [Facebook bug: A Journey from Code Execution to S3 Data Leak](https://medium.com/@win3zz/facebook-bug-a-journey-from-code-execution-to-s3-data-leak-698b7d2b02ef) | 31 | | 2023, Mar | Staging environment file leaked, revealing AWS Access Keys and Secrets | [Saudi social media app leaks user info and pictures](https://cybernews.com/privacy/saudi-social-media-app-leaks-user-info/) | 32 | | 2023, Mar | Passive subdomain takeover | [Passive Takeover - uncovering (and emulating) an expensive subdomain takeover campaign](https://kmsec.uk/blog/passive-takeover/) | 33 | | 2023, Mar | 550 IPs vulnerable to SSRF via Host header, likely due to a vulnerable Lightsail image | [Finding Hundreds of SSRF Vulnerabilities on AWS](https://trickest.com/blog/ssrf-vulnerabilities-on-aws/) | 34 | | 2023, Jun | Credentials in node env file in public S3 bucket | [TripValet.com Leaks Passwords and Stripe Credentials](https://phillips.technology/blog/tripvalet-payment-breach/) | 35 | | 2023, Mar | Staging environment file leaked, revealing AWS Access Keys and Secrets | [Saudi social media app leaks user info and pictures](https://cybernews.com/privacy/saudi-social-media-app-leaks-user-info/) | 36 | | 2023, Aug | librsvg memory leakage exposes Basecamp AWS keys | [AWS keys and user cookie leakage via uninitialized memory leak in outdated librsvg version in Basecamp](https://hackerone.com/reports/2107680) | 37 | | 2024, Feb | Access Key exposed in HTML | [Football Australia leak exposes players’ details](https://cybernews.com/security/football-australia-leak-expose-players/) | 38 | | 2024, Mar | Write permissions to S3 bucket, upload JS that steals credentials | [From S3 bucket to internal network operation](https://medium.com/@red.whisperer/from-s3-bucket-to-internal-network-operation-8073954932b4) | 39 | | 2024, May | Publicly traded company exposed 8m+ PII records in DocumentDB Snapshot | [Publicly Exposed AWS Document DB Snapshots](https://ramimac.me/exposed-docdb) | 40 | | 2024, June | PHP_INFO disclosed credentials, resulting in SES abuse | [Suspecting that access tokens were leaked: Where to look for leak?](https://www.reddit.com/r/aws/comments/1b3340r/suspecting_that_access_tokens_were_leaked_where/) | 41 | | 2024, July | Kubernetes escape in SAP AI Core allowed access to Loki config, leaking AWS credentials with access to S3 | [SAPwned: SAP AI vulnerabilities expose customers’ cloud environments and private AI artifacts](https://www.wiz.io/blog/sapwned-sap-ai-vulnerabilities-ai-security) | 42 | | 2024, July | Hard-coded AWS credential in JS | [how to pwn a billion dollar vc firm using inspect element](https://kibty.town/blog/a16z/) | 43 | | 2024, December | AWS Access Keys leaked via Java Spring Actuator heapdump | [Customer data from 800,000 electric cars and owners exposed online](https://www.bleepingcomputer.com/news/security/customer-data-from-800-000-electric-cars-and-owners-exposed-online/) 44 | | 2025, February | ~150 S3 buckets with dangling references taking over | [8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur](https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/) 45 | | 2025, February | Hardcoded AWS Access Key in Eight Sleep mattress firmware | [Removing Jeff Bezos From My Bed](https://trufflesecurity.com/blog/removing-jeff-bezos-from-my-bed) | 46 | | 2025, March | Multiple AWS credentials exposed publicly due to tj-actions | [GitHub Action tj-actions/changed-files supply chain attack](https://www.wiz.io/blog/github-action-tj-actions-changed-files-supply-chain-attack-cve-2025-30066) | 47 | | 2025, April | AWS Access Keys in frontend JS, resulting in SES abuse | [I Accidentally Exposed AWS Keys. What Happened Next Was a Masterclass in Cloud Persistence](https://medium.com/@bassel.afrem/i-accidentally-exposed-aws-keys-what-happened-next-was-a-masterclass-in-cloud-persistence-8a5154e4d31f) | 48 | | 2025, June | AWS Access Keys leaked in API response, registration of a non-existant logging bucket, cross-tenant compromise | [OneLogin, Many Issues: How I Pivoted from a Trial Tenant to Compromising Customer Signing Keys](https://specterops.io/blog/2025/06/10/onelogin-many-issues-how-i-pivoted-from-a-trial-tenant-to-compromising-customer-signing-keys/) | 49 | | 2025, July | Compromised AWS Access Key, access to Confluence DB, forge and insert a rogue token for any user | [When too much access is not enough: a story about Confluence and tokens](https://blog.quarkslab.com/a-story-about-confluence-and-tokens.html) | 50 | | 2025, September | Cognito with signup enabled | We Hacked Burger King: How Authentication Bypass Led to Drive-Thru Audio Surveillance (DMCA'd) | -------------------------------------------------------------------------------- /ACTORS.md: -------------------------------------------------------------------------------- 1 | ## Catalog of AWS Threat Actors and their Tools 2 | 3 | More information on these actors is available on [malpedia](https://malpedia.caad.fkie.fraunhofer.de). 4 | 5 | | Name | Vectors | Reports | 6 | | ------------- | ------------- | ------------- | 7 | | 8220 Gang | Exploit outdated and misconfigured software | [JupiterOne - 8220 Gang Cloud Botnet Targets Misconfigured Cloud Workloads](https://www.sentinelone.com/blog/8220-gang-cloud-botnet-targets-misconfigured-cloud-workloads/) | 8 | | AlienFox | Opportunistic exploitation of server side misconfigurations, AWS SES-centric functionality | [Sentinel Labs - Dissecting AlienFox \| The Cloud Spammer’s Swiss Army Knife](https://www.sentinelone.com/labs/dissecting-alienfox-the-cloud-spammers-swiss-army-knife/) | 9 | | AMBERSQUID | Cryptomining, distributed on Docker Hub, using non-EC2 services | [AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation](https://sysdig.com/blog/ambersquid/) | 10 | | AndroxGh0st / Xcatze | Exposed Laravel .env configs, use compromise for SES spam or malicious email | [Lacework Labs - AndroxGh0st: the python malware exploiting your AWS keys](https://www.lacework.com/blog/androxghost-the-python-malware-exploiting-your-aws-keys/), [CISA - Known Indicators of Compromise Associated with Androxgh0st Malware](https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-016a) | 11 | | Cloud Snooper | Rootkit, AWS SSM for pivoting | [Sophos - Cloud Snooper Attack Bypasses AWS Security Measures](https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophoslabs-cloud-snooper-report.pdf), [Pacific Rim: Inside the Counter-Offensive](https://news.sophos.com/en-us/2024/10/31/pacific-rim-neutralizing-china-based-threat/?amp=1) | 12 | | Crimson Collective | Abuse exposed credentials, data exfiltration | [Crimson Collective: A New Threat Group Observed Operating in the Cloud](https://www.rapid7.com/blog/post/tr-crimson-collective-a-new-threat-group-observed-operating-in-the-cloud/) | 13 | | Cosmic Wolf | Credential compromise | [CrowdStrike - 2022 Global Threat Report](https://irp.cdn-website.com/5d9b1ea1/files/uploaded/Report2022GTR.pdf) | 14 | | Demonia | Lambda Malware | [Cado Discovers Denonia: The First Malware Specifically Targeting Lambda](https://www.cadosecurity.com/cado-discovers-denonia-the-first-malware-specifically-targeting-lambda/) | 15 | | EC2 Grouper | Credential compromise (primarily code repository) | [Catching "EC2 Grouper"- no indicators required!](https://www.fortinet.com/blog/threat-research/catching-ec2-grouper-no-indicators-required) | 16 | | FBot | AWS SES Abuse | [SentinelOne - Exploring FBot](https://www.sentinelone.com/labs/exploring-fbot-python-based-malware-targeting-cloud-and-payment-services/), [Ian Ahl (tweet)](https://twitter.com/TekDefense/status/1742177330032767063?s=20) | 17 | | Greenbot | Unknown, use compromise for SES spam or malicious email | [Our Approach to Detection: AndroxGh0st and GreenBot Edition ](https://permiso.io/blog/s/approach-to-detection-androxgh0st-greenbot-persistence/) | 18 | | GUI-Vil | Credential compromise and known vulnerabilities | [Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor](https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor/) | 19 | | Hazy Hawk | Subdomain takeovers | [Cloudy with a Chance of Hijacking Forgotten DNS Records Enable Scam Actor](https://blogs.infoblox.com/threat-intelligence/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor/) | 20 | | Kinsing | Malware| [CyberArk - Kinsing: The Malware with Two Faces](https://www.cyberark.com/resources/threat-research-blog/kinsing-the-malware-with-two-faces), [Cloud Defense in Depth: Lessons from the Kinsing Malware](https://sysdig.com/blog/cloud-defense-in-depth/), [Looney Tunables Vulnerability Exploited by Kinsing](https://blog.aquasec.com/loony-tunables-vulnerability-exploited-by-kinsing), [Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers](https://www.tenable.com/blog/kinsing-malware-hides-itself-as-a-manual-page-and-targets-cloud-servers) | 21 | | LAPSUS$ / DEV-0537 | phone-based social engineering; SIM-swapping to facilitate account takeover; accessing personal email accounts of employees at target organizations; paying employees, suppliers, or business partners of target organizations for access to credentials and multifactor authentication (MFA) approval | [Microsoft - DEV-0537 criminal actor targeting organizations for data exfiltration and destruction](https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/) | 22 | | Legion | AWS SES Abuse | [Permiso - Legion: The Latest Threat in Mass Spam Attacks](https://permiso.io/blog/s/legion-mass-spam-attacks-in-aws/), [Cado Security - Legion: an AWS Credential Harvester and SMTP Hijacker](https://www.cadosecurity.com/legion-an-aws-credential-harvester-and-smtp-hijacker/), [Updates to Legion: A Cloud Credential Harvester and SMTP Hijacker](https://www.cadosecurity.com/updates-to-legion-a-cloud-credential-harvester-and-smtp-hijacker/) | 23 | | P2PInfect | P2P Redis botnet (11.2% AWS IPs) | [Cado Security Labs Researchers Witness a 600X Increase in P2Pinfect Traffic](https://www.cadosecurity.com/cado-security-labs-researchers-witness-a-600x-increase-in-p2pinfect-traffic/) | 24 | | RBAC Buster | Targeting k8s anonymous access, and use a ClusterRoleBinding and gain full access to the cluster with persistence | [First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters](https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters) | 25 | | Outlaw | Targeting known CVEs or SSH bruteforce | [Outlaw Group Distributes Cryptocurrency-Mining Botnet](https://www.trendmicro.com/en_us/research/18/k/outlaw-group-distributes-botnet-for-cryptocurrency-mining-scanning-and-brute-force.html) |© 26 | | Predator AI | Stealer and hacktool targets AWS SES | [ChatGPT-Powered Infostealer Takes Aim at Cloud Platforms](https://www.sentinelone.com/labs/predator-ai-chatgpt-powered-infostealer-takes-aim-at-cloud-platforms/) | 27 | | Rocke | Targeting known CVEs | [Cisco Talos - Rocke: The Champion of Monero Miners](https://blog.talosintelligence.com/2018/08/rocke-champion-of-monero-miners.html) | 28 | | Silentbob (TeamTNT or copycat) | Exploit misconfigured docker and k8s | [Aqua Security - Threat Alert: Anatomy of Silentbob’s Cloud Attack](https://blog.aquasec.com/threat-alert-anatomy-of-silentbobs-cloud-attack), [Permiso - Agile Approach to Mass Cloud Credential Harvesting and Crypto Mining Sprints Ahead](https://permiso.io/blog/s/agile-approach-to-mass-cloud-cred-harvesting-and-cryptomining/), [SentinelOne - Cloudy With a Chance of Credentials \| AWS-Targeting Cred Stealer Expands to Azure, GCP](https://s1.ai/cloudcreds), [Datadog - An analysis of a TeamTNT doppelgänger](https://securitylabs.datadoghq.com/articles/analysis-of-teamtnt-doppelganger/) | 29 | | SNS Sender | AWS SNS SMS Phishing Kit | [SentinelOne - SNS Sender \| Active Campaigns Unleash Messaging Spam Through the Cloud](https://www.sentinelone.com/labs/sns-sender-active-campaigns-unleash-messaging-spam-through-the-cloud/) | 30 | | Spoiled Scorpius (Distributors of RansomHub) | "Delete backups from both on-premises and cloud storage" | [Unit 42: Ransomware Review: First Half of 2024](https://unit42.paloaltonetworks.com/unit-42-ransomware-leak-site-data-analysis/) | 31 | | TeamTNT | Exploit misconfigured docker and k8s | [MITRE ATT&CK - TeamTNT](https://attack.mitre.org/groups/G0139/) | 32 | | TraderTraitor / UNC4899 | Social Engineering / malware deliver | [TraderTraitor: Deep Dive](https://www.wiz.io/blog/north-korean-tradertraitor-crypto-heist) | 33 | | TRIPLESTRENGTH | Leverage stolen credentials and cookies for mining and resource hijack, as well as access resale | [M-Trends 2025: TRIPLESTRENGTH Leverages Stolen Credentials for Cloud Assets for Illicit Cryptocurrency Mining](https://services.google.com/fh/files/misc/m-trends-2025-en.pdf) | 34 | | Turla / Pensive Uras | Stealer targets AWS credentials | [Appendix for "Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (aka Turla)"](https://github.com/PaloAltoNetworks/Unti42-Threat-Intelligence-Article-Information/blob/main/Appendix-for-article-on-Pensive-Ursa-using-Kazuar.md) | 35 | | UNC2903 | SSRF (targeting known CVEs) | [Mandiant - Old Services, New Tricks: Cloud Metadata Abuse by UNC2903](https://www.mandiant.com/resources/blog/cloud-metadata-abuse-unc2903) | 36 | | UNC3944 / Scattered Spider / Starfraud / Scatter Swine / Muddled Libra / LUCR-3 | Social engineering, Accidental credential leakage | [CISA - Joint Advisory Scattered Spider](https://www.cisa.gov/sites/default/files/2023-11/aa23-320a_scattered_spider_0.pdf), [Mandiant - Why Are You Texting Me? UNC3944 Leverages SMS Phishing Campaigns for SIM Swapping, Ransomware, Extortion, and Notoriety](https://www.mandiant.com/resources/blog/unc3944-sms-phishing-sim-swapping-ransomware), [Reliaquest - Scattered Spider Attack Analysis](https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/), [Crowdstrike - Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies](https://web.archive.org/web/20230316062338/https://www.crowdstrike.com/blog/analysis-of-intrusion-campaign-targeting-telecom-and-bpo-companies/), [Unit42 - Muddled Libra’s Evolution to the Cloud](https://unit42.paloaltonetworks.com/muddled-libra-evolution-to-cloud/), [LUCR-3: Scattered Spider Getting SaaS-y in the Cloud](https://permiso.io/blog/lucr-3-scattered-spider-getting-saas-y-in-the-cloud), [Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries](https://blog.eclecticiq.com/ransomware-in-the-cloud-scattered-spider-targeting-insurance-and-financial-industries) | 37 | | Watchdog | Exploit misconfigured docker and k8s | [TeamTNT Returns – or Does It?](https://www.trendmicro.com/en_us/research/22/j/teamtnt-returns-or-does-it.html) | 38 | -------------------------------------------------------------------------------- /REPORTS.md: -------------------------------------------------------------------------------- 1 | ## "State of the Cloud" Report Incident Takeaways 2 | 3 | | Report | Takeaways | 4 | | ------------- | ------------- | 5 | | Palo Alto Unit 42: [Cloud Threat Report H2 2020](https://falksangdata.no/wp-content/uploads/2021/04/unit-42-cloud-threat-report-2h-2020.pdf) | Unit 42 research shows that cryptojacking affects at least 23% of organizations globally that maintain cloud infrastructure | 6 | | Accenture: [Cyber Threat Intelligence Report Volume 2 - 2021](https://raw.githubusercontent.com/jacobdjwilson/awesome-annual-security-reports/main/Annual%20Security%20Reports/2022/Accenture-Cyber-Threat-Intelligence-Report-Vol2-2022.pdf) | Cloud environments were and continue to be attractive targets, perhaps due to lower monitoring levels than on-premise environments. ... cloud-related malware has evolved faster than more traditional malware in 2021 based on analysis of the rate of code changes between cryptominers (a primary malware malicious actors deploy in compromised cloud environments) compared to code changes in botnets and ransomware ... Accenture observed ransomware and extortion operators targeting cloud infrastructure and hosted backups in attempts to increase operational impact | 7 | | Fugue: [The State of Cloud Security 2021](https://f.hubspotusercontent20.net/hubfs/4846674/Resources%20Content/State_of_Cloud_Security_2021.pdf) | N/A | 8 | | IBM Security: [2021 X-Force Cloud Threat Landscape Report](https://raw.githubusercontent.com/jacobdjwilson/awesome-annual-security-reports/main/Annual%20Security%20Reports/2021/IBM-X-Force-Cloud-Threat-Landscape-Report-2021.pdf) | The three most commonly observed methods for threat actors to compromise cloud environments in cases studied by X-Force IR were password spraying, software vulnerability, and pivoting from an on-premise compromise to the cloud | 9 | | IDC for Ermetic: [State of Cloud Security 2021](https://www.vpngids.nl/wp-content/uploads/ermetic-idc-survey-report-state-of-cloud-security-2021.pdf) | Most organizations (63%) confirmed that their sensitive data has been exposed in the cloud | 10 | | Snyk: [State of Cloud Native Application Security 2021](https://go.snyk.io/rs/677-THP-415/images/State%20of%20CNAS.pdf) | Over 56% experienced a misconfiguration or known unpatched vulnerability incident involving their cloud native applications | 11 | | GCP: [November 2021 Cloud Threat Intelligence report](https://services.google.com/fh/files/misc/gcat-threathorizons-full-nov2021.pdf) | Of 50 recently compromised GCP instances, 86% of the compromised Google Cloud instances were used to perform cryptocurrency mining | 12 | | AWS: [2022 re:Inforce session on ransomware](https://www.firemon.com/what-you-need-to-know-about-ransomware-in-aws) h/t [Rich Mogull](https://twitter.com/rmogull) | ransomware is a common problem for AWS customers, stemming from two common exploit vectors:
A traditional ransomware attack against instances in AWS. The attacker compromises an instance (often via phishing a user/admin, not always direct compromise), then installs their malware to encrypt the data and spread to other reachable instances. This is really no different than ransomware in a data center since it doesn’t involve anything cloud-specific.
The attacker copies data out of an S3 bucket and then deletes the original data. This is the most commonly seen cloud native ransomware on AWS.| 13 | | AWS: [AWS CIRT announces the release of five publicly available workshops](https://aws.amazon.com/blogs/security/aws-cirt-announces-the-release-of-five-publicly-available-workshops/) | Over the past year, AWS CIRT has responded to hundreds of such security events, including the unauthorized use of AWS Identity and Access Management (IAM) credentials, ransomware and data deletion in an AWS account, and billing increases due to the creation of unauthorized resources to mine cryptocurrency. | 14 | | CheckPoint: [Cyber Security Report 2022](https://raw.githubusercontent.com/jacobdjwilson/awesome-annual-security-reports/main/Annual%20Security%20Reports/2022/CheckPoint-Cybersecurity-Report-2022.pdf) | Since late 2021, we have witnessed a wave of attacks leveraging flaws in the services of industry-leading cloud service providers | 15 | | CrowdStrike: [2022 Global Threat Report](https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2022GTR.pdf) | Cloud-related threats are particularly likely to become more prevalent and to evolve, given that targeted intrusion adversaries are expected to continue prioritizing targets that provide direct access to large consolidated stores of high-value data | 16 | | CrowdStrike: [Protectors of the Cloud eBook](https://go.crowdstrike.com/rs/281-OBQ-266/images/eBookProtectorsoftheCloudEng.pdf) | CrowdStrike continues to see adversary activity in three particular areas concerning the cloud:
Neglected cloud infrastructure that is slated for retirement yet still contains sensitive data
A lack of outbound restrictions and workload protection to exfiltrate your data
Adversaries leveraging common cloud services to obfuscate malicious activity | 17 | | Datadog: [State of AWS Security 2022](https://www.datadoghq.com/state-of-aws-security/) | N/A | 18 | | ENISA [Threat Landscape 2022](https://www.enisa.europa.eu/topics/cyber-threats/threats-and-trends) | Cybercriminals target cloud services mostly in the following ways.
* Exploiting cloud vulnerabilities: virtualisation infrastructure has been increasingly targeted (e.g. VMWare vSphere and ESXi platforms) by cybercriminals and especially by ransomware groups.
• Using cloud services for hosting their infrastructure: cybercriminals take advantage of the highly scalable and reliable cloud infrastructure and use legitimate cloud services to bypass security controls by blending into normal network traffic.
• Targeting cloud credentials: cybercriminals use social engineering attacks to harvest credentials for cloud services (e.g. Microsoft Office 365, Okta, etc.).
• Exploiting misconfigured image containers cybercriminals increasingly target poorly configured Docker containers and Kubernetes clusters.
• Targeting cloud instances for cryptomining (e.g. TeamTNT group): security researchers have identified a cloud-focused toolset from the TeamTNT group.
• Targeting cloud infrastructure (e.g. Azure AD), cloud application programming interfaces (APIs), and cloud-hosted backups by ransomware groups to infiltrate cloud environments and increase impact. | 19 | | Expel: [Q1 2022 Threat Report](https://expel.com/wp-content/uploads/2022/05/Expel-QTR-051822.pdf) | Misconfigurations and exposed long-term credentials in Amazon Web Services (AWS) and Google Cloud Platform (GCP) accounted for 3% of incidents
These incidents break down into two categories:
1. Admins accidentally setting AWS S3 Buckets to Public
2. Threat actors gaining access to exposed long-lived credentials in AWS and GCP, which resulted in unauthorized access | 20 | | Fidelis: [2022 AWS Cloud Security Report](https://connect.fidelissecurity.com/rs/884-ZRZ-648/images/2022-AWS-Cloud-Security-Report.pdf) | For the 31% of organizations that experienced a security incident in the cloud, misconfiguration was the leading cause (28%), followed by inappropriately shared data (17%) and account compromise (15%). Exploited vulnerabilities account for 13% of incidents | 21 | | GCP: [July 2022 Cloud Threat Intelligence report](https://services.google.com/fh/files/blogs/gcat_threathorizons_full_july2022.pdf) | the most common attack vectors used across cloud providers was brute force of cloud services that are exposed to the internet and have a weak or default password ... close behind brute force attacks was the exploitation of vulnerable software | 22 | | IBM: [Cost of a Data Breach 2022](https://ermetic.com/blog/cloud/ibm-cost-of-a-data-breach-2022-highlights-for-cloud-security-professionals/)| 45% of Breaches Were Cloud-Based. Stolen or compromised credentials were the number one attack vector in the past two years. Following credentials, the next most common initial attack vectors were:
Second place: Phishing - 16% of breaches, $4.91M average costs
Third place: Cloud misconfigurations - 15% of breaches, $4.14M average costs
Fourth place: Third-party software vulnerability - 13% of breaches, $4.55M average costs|
| 23 | | IBM Security X-Force: [2022 Cloud Threat Landscape Report](https://raw.githubusercontent.com/jacobdjwilson/awesome-annual-security-reports/main/Annual%20Security%20Reports/2022/IBM-X-Force-Cloud-Threat-Landscape-Report-2022.pdf) | Scanning for and exploiting vulnerable infrastructure was the most commonly observed initial access vector in cloud environments, based on X-Force responding to related cases. This vector represented the initial infection vector for 26% of cloud incidents. Stolen credential use was the second most observed at 9%. | 24 | | (ISC)2: [2022 Cloud Security Report](https://www.isc2.org/-/media/5E48A83950264AB1B265B1F073F5C9FB.ashx) | We asked cybersecurity professionals about the cloud security threats that most concern them. Misconfiguration of cloud security remains the biggest cloud security risk according to 62% of cybersecurity professionals in our survey. This is followed by insecure interfaces/APIs (54%), exfiltration of sensitive data (51%) and unauthorized access (50%). | 25 | | Orca: [2022 State of Public Cloud Security](https://orca.security/wp-content/uploads/2022/09/Orca-Securitys-2022-State-of-Public-Cloud-Security-Report.pdf) | N/A | 26 | | Palo Alto Unit 42: [Incident Response Threat Report 2022](https://www.paloaltonetworks.com/unit42/2022-incident-response-report) | Nearly 65% of known cloud security incidents were due to misconfigurations. The main culprit? IAM configuration. | 27 | | riskrecon: [Cloud Risk Surface Report](https://cdn2.hubspot.net/hubfs/2477095/Cloud%20Risk%20Surface%20Report%202019/RR_Cloud-Report_Web_final%20(1).pdf) | N/A | 28 | | Snyk: [State of cloud security 2022](https://resources.snyk.io/state-of-cloud-security) | 80% of organizations experienced a serious cloud security incident during the last year - 33% breach, 26% leak, 27% intrusion, 23% cryptomining | 29 | | Trend Micro: [2022 Midyear Cybersecurity Report](https://raw.githubusercontent.com/jacobdjwilson/awesome-annual-security-reports/main/Annual%20Security%20Reports/2022/TrendMicro-Defending-The-Expanding-Attack-Surface-2022.pdf) | 62% of the respondents admitted to having blind spots that weaken their security posture. 37% of the organizations also claimed to have the least insight into cloud assets. 35% said the same of their insights into networks, while 32% responded that they have the least insight into their end-user assets. | 30 | | Wiz: [2022 cloud security threats report](https://www.datocms-assets.com/75231/1659965344-6223652ebbad288bbdfa046e_2022-cloud-security-threats.pdf) | Effectively, unintentionally exposed databases are one of the most common sources of data breaches | 31 | | GCP: [GCAT Threat Horizons January 2023](https://services.google.com/fh/files/blogs/gcat_threathorizons_full_jan2023.pdf) | The most common cloud compromise factors from Q3 2022 include Weak or No Credentials (41.1%), API Compromise (19.6%), Software issue (17.9%), and Misconfiguration (16.1%) | 32 | | Wiz: [State of the Cloud 2023](https://www.wiz.io/blog/the-top-cloud-security-threats-to-be-aware-of-in-2023) | In experiments we ran where we created S3 buckets ... we spotted attempts to list the contents of the S3 buckets in as little as 13 hours | 33 | | Permiso: [2022 - End of Year Observations](https://permiso.io/blog/s/permiso-2022-end-of-year-observations/) | All of the incidents we detected and responded to were a result of a compromised credential ... GitHub is still one of the primary sources ... The majority of exposed keys live in three main file types: APKs, Windows Biaries, Plain Text Files | 34 | | GCP: [GCAT Threat Horizons April 2023](https://services.google.com/fh/files/blogs/gcat_threathorizons_full_apr2023.pdf) | The most common cloud compromise factors from Q4 2022 include Weak or No Credentials (47.8%), API Compromise (19.6%), Software issue (13.0%), and Misconfiguration (10.9%) | 35 | | Orca: [2023 Honeypotting in the Cloud Report](https://orca.security/resources/blog/2023-honeypotting-in-the-cloud-report/) | SSH honeypot within 4 minutes, but no attempts to use planted key. S3 bucket within 1 hour, key within 8 hours. Docker image never downloaded. ECR public registry accessed after four months. Elasticsearch scanned, but no attempts to use planted key. Public EBS backup never downloaded. Redis accessed after 2.5 hours, but no attempts to use planted key | 36 | | Laminar: [State of Public Cloud Data Security Report 2023](https://laminarsecurity.com/wp-content/uploads/2023/03/laminar-state-of-public-cloud-data-security-report-2023.pdf) | More than three-fourths (77 percent) of respondents said their organization’s public cloud data has been accessed by an adversary in the last 12 months | 37 | | GCP: [GCAT Threat Horizons August 2023](https://services.google.com/fh/files/blogs/gcat_threathorizons_full_jul2023.pdf) | The most common cloud compromise factors from Q1 2023 include Weak or No Credentials (54.8%), Misconfiguration (19%), Sensitive UI or API exposure (11.9%) | 38 | | CrowdStrike: [2023 Threat Hunting Report](https://go.crowdstrike.com/rs/281-OBQ-266/images/report-crowdstrike-2023-threat-hunting-report.pdf) | 160% increase in attempts to abuse cloud instance metadata APIs. 95% increase in cloud exploitation in 2022. 3X increase in cases involving cloud-concious threat actors in 2022. | 39 | | Dig Security: [The State of Cloud Data Security 2023](https://pages.dig.security/hubfs/Report%20The%20State%20of%20Cloud%20Data%20Security%20in%202023.pdf) | More than 7% of storage services containing sensitive data are public. More than 60% of storage services are not encrypted at rest, and almost 70% lack comprehensive logging. | 40 | | CrowdStrike: [2023 Cloud Risk Report](https://www.dlt.com/sites/default/files/resource-attachments/2023-09/TDSPS_Oct2023_WS_2023_Cloud_risk_report.pdf) | "Cloud-conscious threat actors primarily gained initial access to the cloud by using valid existing accounts, resetting passwords or exploiting public-facing applications" | 41 | | Wiz: [I know what you mined last summer](https://www.wiz.io/blog/cryptojacking-attacks-summer-2023) | Six cases via Open Jupyter Notebook, two via Unpatched Apache Solr. XMRig, CCminer, and XMR-Stak-RX deployed. | 42 | | GCP: [GCAT Threat Horizons October 2023](https://services.google.com/fh/files/blogs/gcat_threathorizons_full_oct2023.pdf) | The most common cloud compromise factors from Q2 2023 include Weak or No Credentials (54.3%), Misconfiguration (15.2%), Sensitive UI or API exposure (15.2%), Vulnerable Software (10.9%). ~70% of attacks are intended to facilitate coin mining. | 43 | | GCP: [GCAT Threat Horizons H1 2024](https://services.google.com/fh/files/misc/threat_horizons_report_h12024.pdf) | The most common cloud compromise factors from 2023 include Weak or No Credentials (51.1%), Misconfiguration (17.3%), Sensitive UI or API exposure (13.7%), Vulnerable Software (11.5%). ~66% of attacks are intended to facilitate coin mining. ~25% of attacks are intended to then target third parties. | 44 | | Palo Alto Unit 42: [Incident Response Threat Report 2024](https://unit42.paloaltonetworks.com/unit42-incident-response-report-2024-threat-guide/) | "we’ve seen an increase in incident responses involving cloud cases, from 6% in 2021 to 16.6% in 2023." "Visibility gaps also led to unnecessary resource exposure, such as internet-exposed remote desktops or inadequately secured cloud workloads. These exposures contributed to 9.6% of cases." | 45 | | CrowdStrike: [2024 Global Threat Report](https://go.crowdstrike.com/rs/281-OBQ-266/images/GlobalThreatReport2024.pdf) | Cloud environment intrusions increased by 75% YoY. 84% of adversary-attributed cloud-conscious intrusions were focused on eCrime. | 46 | | Cado: [H2 2023 Cloud Threat Findings Report](https://14518100.fs1.hubspotusercontent-na1.net/hubfs/14518100/H2%202023%20Cloud%20Threat%20Findings%20Report.pdf) | Attackers are getting more sophisticated around Docker, Jupyter, etc. Docker is ~90% of non-SSH honeypot traffic. Diversifying (non-cryptojacking) objectives. | 47 | | AWS, Ben Fletcher: [Security Lessons Learnt From The Cloud Frontline](https://www.youtube.com/watch?v=VNlXYrJ677k) | Leaked credentials are the initial vector in 66% of incidents, 33% of these credentials are `root`. 13% of incidents are public EC2 instances. The goals are resource hijacking, ransom (delete + extort), and scorched earth | 48 | | Red Canary: [2024 Threat Detection Report](https://resource.redcanary.com/rs/003-YRU-314/images/2024ThreatDetectionReport_RedCanary.pdf?version=0) | Cloud Accounts was the fourth most prevalent ATT&CK technique we detected this year, increasing 16-fold in detection volume and affecting three times as many customers as last year ... expanded use of phishing kits and infostealers to collect credentials and/or MFA-signed access tokens | 49 | | GCP: [GCAT Threat Horizons H2 2024](https://services.google.com/fh/files/misc/threat_horizons_report_h2_2024.pdf) | The most common initial vectors in H2 2024 include Weak or No Credentials (47.2%) and Misconfiguration (30.3%). ~59% of attacks are intended to facilitate coin mining. ~23.5% of attacks are intended to then target third parties. | 50 | | Orca: [2024 State of Public Cloud Security](https://orca.security/wp-content/uploads/2024/02/2024-State-of-Cloud-Security-Report.pdf) | "87% of cloud malware attacks are via known Trojans." | 51 | | Crowdstrike, Sebastian Walla: [Cloud-Conscious Tactics, Techniques, and Procedures (TTPs)](https://fwdcloudsec.org/assets/presentations/2024/europe/sebastian-walla-cloud-conscious-tactics-techniques-and-procedures-an-overview.pdf) | ~250 cloud cases in 2023, 1/3 of which involve "cloud-conscious" threat actors, Initial access: Valid Accounts (28%), Exploit Public-Facing Application (16 %) | 52 | | Sysdig: [2024 Global Threat Report](https://sysdig.com/content/c/pf-2024-global-threat-report?x=u_WFRi) | " Many of the attacks Sysdig TRT captured this year were motivated by income generation and free access to otherwise expensive resources". LLMJacking "can run victims over $100,000 daily" | 53 | | Expel: [Quarterly Threat Report (QTR) for Q3 2024](https://expel.com/blog/expel-quarterly-threat-report-volume-i-q3-by-the-numbers/) | "Incidents in cloud infrastructures (AWS, GCP, Azure, and Kubernetes) made up only 2% of the total incident volume. This has stayed consistent over the last few quarters" | 54 | | Cowbell Insurance: [Cyber Roundup Report 2024](https://cowbell.insure/wp-content/uploads/pdfs/CB-US-Q4-CyberRoundupReport24.pdf) | "Analysis relating to cloud provider usage found that businesses using Google Cloud report a 28% lower frequency of cyber incidents relative to other cloud users. In addition to a reduced frequency of incidents, Google Cloud exhibits the lowest severity of cyber incidents, while Microsoft Azure shows the highest." | 55 | | Tenable: [Cloud Risk Report 2024](https://dam.tenable.com/23e27766-3065-4904-95d7-b1fe015e7d59/tenable-cloud-risk-report-2024.pdf) | "38% of organizations have at least one cloud workload that is publicly exposed, critically vulnerable and highly privileged. 84.2% possess unused or longstanding access keys with critical or high severity excessive permissions." | 56 | | GCP: [GCAT Threat Horizons H1 2025](https://services.google.com/fh/files/misc/threat_horizons_report_h1_2025.pdf) | The most common initial vectors in H1 2025 include Weak or No Credentials (45.7%) and Misconfiguration (34.3%), 17.1% API/UI compromise. "More than half (62.2%) of threat actor movements once they gained access involved attempting lateral movement within an environment and downloading tools designed for this purpose." | 57 | | Expel: [Annual Threat Report 2025](https://expel.com/wp-content/uploads/2025/01/Expel-Annual-Threat-Report-2025-013025.pdf) | "Attacks specifically targeting cloud infrastructure accounted for approximately 2% of threats, which was identical to 2023.", ~45% credential compromise, ~32% server-side exploitation, ~14% SSRF | 58 | | Unit42: [Global Incident Response Report 2025](https://www.paloaltonetworks.com/engage/unit42-2025-global-incident-response-report) | "86% of incidents that Unit 42 responded to involved business disruption", "in nearly one in five cases, data exfiltration took place within the first hour of compromise.", "A little less than one third of cases (29%) in 2024 were cloud-related." | 59 | | Crowdstrike: [Global Threat Report](https://www.crowdstrike.com/explore/2025-global-threat-report) | "new and unattributed cloud intrusions increased 26% compared to 2023", "abusing valid accounts ... \[accounted\] for 35% of cloud incidents in the first half of 2024. | 60 | | Mandiant: [M-Trends 2025](https://services.google.com/fh/files/misc/m-trends-2025-en.pdf) | The most commonly observed initial infection vectors included email phishing (39%), stolen credentials (35%), SIM swapping (6%), and voice phishing or vishing (6%). Mandiant also noted use of prior compromise, exploits, third-party compromise, brute-force attacks, and malicious insiders—specifically North Korean IT workers applying for jobs under false pretenses-in order to gain access to cloud systems. data theft was observed in nearly two-thirds of cloud compromises (66%). Over a third of cases (38%), served financially motivated goals, including data theft extortion without ransomware encryption (16%), business email compromise (BEC) (13%), ransomware (9%) | 61 | | Wiz: [2025 Cloud Attacks Retrospective](https://www.wiz.io/blog/cloud-attack-retrospective-2025) | Phishing a top cause, 35% of breaches due to weaponized 1-day vulnerabilities | 62 | | GCP: [GCAT Threat Horizons H2 2025](https://services.google.com/fh/files/misc/cloud_threat_horizons_report_h22025.pdf) | During the first half of 2025, weak or absent credentials were the predominant threat, accounting for 47.1% of incidents (Fig. 1). Misconfigurations (29.4%) and API/UI compromises (11.8%) followed as the next most frequently observed initial access vectors -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | GNU GENERAL PUBLIC LICENSE 2 | Version 3, 29 June 2007 3 | 4 | Copyright (C) 2007 Free Software Foundation, Inc. 5 | Everyone is permitted to copy and distribute verbatim copies 6 | of this license document, but changing it is not allowed. 7 | 8 | Preamble 9 | 10 | The GNU General Public License is a free, copyleft license for 11 | software and other kinds of works. 12 | 13 | The licenses for most software and other practical works are designed 14 | to take away your freedom to share and change the works. By contrast, 15 | the GNU General Public License is intended to guarantee your freedom to 16 | share and change all versions of a program--to make sure it remains free 17 | software for all its users. We, the Free Software Foundation, use the 18 | GNU General Public License for most of our software; it applies also to 19 | any other work released this way by its authors. You can apply it to 20 | your programs, too. 21 | 22 | When we speak of free software, we are referring to freedom, not 23 | price. Our General Public Licenses are designed to make sure that you 24 | have the freedom to distribute copies of free software (and charge for 25 | them if you wish), that you receive source code or can get it if you 26 | want it, that you can change the software or use pieces of it in new 27 | free programs, and that you know you can do these things. 28 | 29 | To protect your rights, we need to prevent others from denying you 30 | these rights or asking you to surrender the rights. Therefore, you have 31 | certain responsibilities if you distribute copies of the software, or if 32 | you modify it: responsibilities to respect the freedom of others. 33 | 34 | For example, if you distribute copies of such a program, whether 35 | gratis or for a fee, you must pass on to the recipients the same 36 | freedoms that you received. You must make sure that they, too, receive 37 | or can get the source code. And you must show them these terms so they 38 | know their rights. 39 | 40 | Developers that use the GNU GPL protect your rights with two steps: 41 | (1) assert copyright on the software, and (2) offer you this License 42 | giving you legal permission to copy, distribute and/or modify it. 43 | 44 | For the developers' and authors' protection, the GPL clearly explains 45 | that there is no warranty for this free software. For both users' and 46 | authors' sake, the GPL requires that modified versions be marked as 47 | changed, so that their problems will not be attributed erroneously to 48 | authors of previous versions. 49 | 50 | Some devices are designed to deny users access to install or run 51 | modified versions of the software inside them, although the manufacturer 52 | can do so. This is fundamentally incompatible with the aim of 53 | protecting users' freedom to change the software. The systematic 54 | pattern of such abuse occurs in the area of products for individuals to 55 | use, which is precisely where it is most unacceptable. Therefore, we 56 | have designed this version of the GPL to prohibit the practice for those 57 | products. If such problems arise substantially in other domains, we 58 | stand ready to extend this provision to those domains in future versions 59 | of the GPL, as needed to protect the freedom of users. 60 | 61 | Finally, every program is threatened constantly by software patents. 62 | States should not allow patents to restrict development and use of 63 | software on general-purpose computers, but in those that do, we wish to 64 | avoid the special danger that patents applied to a free program could 65 | make it effectively proprietary. To prevent this, the GPL assures that 66 | patents cannot be used to render the program non-free. 67 | 68 | The precise terms and conditions for copying, distribution and 69 | modification follow. 70 | 71 | TERMS AND CONDITIONS 72 | 73 | 0. Definitions. 74 | 75 | "This License" refers to version 3 of the GNU General Public License. 76 | 77 | "Copyright" also means copyright-like laws that apply to other kinds of 78 | works, such as semiconductor masks. 79 | 80 | "The Program" refers to any copyrightable work licensed under this 81 | License. Each licensee is addressed as "you". "Licensees" and 82 | "recipients" may be individuals or organizations. 83 | 84 | To "modify" a work means to copy from or adapt all or part of the work 85 | in a fashion requiring copyright permission, other than the making of an 86 | exact copy. The resulting work is called a "modified version" of the 87 | earlier work or a work "based on" the earlier work. 88 | 89 | A "covered work" means either the unmodified Program or a work based 90 | on the Program. 91 | 92 | To "propagate" a work means to do anything with it that, without 93 | permission, would make you directly or secondarily liable for 94 | infringement under applicable copyright law, except executing it on a 95 | computer or modifying a private copy. Propagation includes copying, 96 | distribution (with or without modification), making available to the 97 | public, and in some countries other activities as well. 98 | 99 | To "convey" a work means any kind of propagation that enables other 100 | parties to make or receive copies. Mere interaction with a user through 101 | a computer network, with no transfer of a copy, is not conveying. 102 | 103 | An interactive user interface displays "Appropriate Legal Notices" 104 | to the extent that it includes a convenient and prominently visible 105 | feature that (1) displays an appropriate copyright notice, and (2) 106 | tells the user that there is no warranty for the work (except to the 107 | extent that warranties are provided), that licensees may convey the 108 | work under this License, and how to view a copy of this License. If 109 | the interface presents a list of user commands or options, such as a 110 | menu, a prominent item in the list meets this criterion. 111 | 112 | 1. Source Code. 113 | 114 | The "source code" for a work means the preferred form of the work 115 | for making modifications to it. "Object code" means any non-source 116 | form of a work. 117 | 118 | A "Standard Interface" means an interface that either is an official 119 | standard defined by a recognized standards body, or, in the case of 120 | interfaces specified for a particular programming language, one that 121 | is widely used among developers working in that language. 122 | 123 | The "System Libraries" of an executable work include anything, other 124 | than the work as a whole, that (a) is included in the normal form of 125 | packaging a Major Component, but which is not part of that Major 126 | Component, and (b) serves only to enable use of the work with that 127 | Major Component, or to implement a Standard Interface for which an 128 | implementation is available to the public in source code form. A 129 | "Major Component", in this context, means a major essential component 130 | (kernel, window system, and so on) of the specific operating system 131 | (if any) on which the executable work runs, or a compiler used to 132 | produce the work, or an object code interpreter used to run it. 133 | 134 | The "Corresponding Source" for a work in object code form means all 135 | the source code needed to generate, install, and (for an executable 136 | work) run the object code and to modify the work, including scripts to 137 | control those activities. However, it does not include the work's 138 | System Libraries, or general-purpose tools or generally available free 139 | programs which are used unmodified in performing those activities but 140 | which are not part of the work. For example, Corresponding Source 141 | includes interface definition files associated with source files for 142 | the work, and the source code for shared libraries and dynamically 143 | linked subprograms that the work is specifically designed to require, 144 | such as by intimate data communication or control flow between those 145 | subprograms and other parts of the work. 146 | 147 | The Corresponding Source need not include anything that users 148 | can regenerate automatically from other parts of the Corresponding 149 | Source. 150 | 151 | The Corresponding Source for a work in source code form is that 152 | same work. 153 | 154 | 2. Basic Permissions. 155 | 156 | All rights granted under this License are granted for the term of 157 | copyright on the Program, and are irrevocable provided the stated 158 | conditions are met. This License explicitly affirms your unlimited 159 | permission to run the unmodified Program. The output from running a 160 | covered work is covered by this License only if the output, given its 161 | content, constitutes a covered work. This License acknowledges your 162 | rights of fair use or other equivalent, as provided by copyright law. 163 | 164 | You may make, run and propagate covered works that you do not 165 | convey, without conditions so long as your license otherwise remains 166 | in force. You may convey covered works to others for the sole purpose 167 | of having them make modifications exclusively for you, or provide you 168 | with facilities for running those works, provided that you comply with 169 | the terms of this License in conveying all material for which you do 170 | not control copyright. Those thus making or running the covered works 171 | for you must do so exclusively on your behalf, under your direction 172 | and control, on terms that prohibit them from making any copies of 173 | your copyrighted material outside their relationship with you. 174 | 175 | Conveying under any other circumstances is permitted solely under 176 | the conditions stated below. Sublicensing is not allowed; section 10 177 | makes it unnecessary. 178 | 179 | 3. Protecting Users' Legal Rights From Anti-Circumvention Law. 180 | 181 | No covered work shall be deemed part of an effective technological 182 | measure under any applicable law fulfilling obligations under article 183 | 11 of the WIPO copyright treaty adopted on 20 December 1996, or 184 | similar laws prohibiting or restricting circumvention of such 185 | measures. 186 | 187 | When you convey a covered work, you waive any legal power to forbid 188 | circumvention of technological measures to the extent such circumvention 189 | is effected by exercising rights under this License with respect to 190 | the covered work, and you disclaim any intention to limit operation or 191 | modification of the work as a means of enforcing, against the work's 192 | users, your or third parties' legal rights to forbid circumvention of 193 | technological measures. 194 | 195 | 4. Conveying Verbatim Copies. 196 | 197 | You may convey verbatim copies of the Program's source code as you 198 | receive it, in any medium, provided that you conspicuously and 199 | appropriately publish on each copy an appropriate copyright notice; 200 | keep intact all notices stating that this License and any 201 | non-permissive terms added in accord with section 7 apply to the code; 202 | keep intact all notices of the absence of any warranty; and give all 203 | recipients a copy of this License along with the Program. 204 | 205 | You may charge any price or no price for each copy that you convey, 206 | and you may offer support or warranty protection for a fee. 207 | 208 | 5. Conveying Modified Source Versions. 209 | 210 | You may convey a work based on the Program, or the modifications to 211 | produce it from the Program, in the form of source code under the 212 | terms of section 4, provided that you also meet all of these conditions: 213 | 214 | a) The work must carry prominent notices stating that you modified 215 | it, and giving a relevant date. 216 | 217 | b) The work must carry prominent notices stating that it is 218 | released under this License and any conditions added under section 219 | 7. This requirement modifies the requirement in section 4 to 220 | "keep intact all notices". 221 | 222 | c) You must license the entire work, as a whole, under this 223 | License to anyone who comes into possession of a copy. This 224 | License will therefore apply, along with any applicable section 7 225 | additional terms, to the whole of the work, and all its parts, 226 | regardless of how they are packaged. This License gives no 227 | permission to license the work in any other way, but it does not 228 | invalidate such permission if you have separately received it. 229 | 230 | d) If the work has interactive user interfaces, each must display 231 | Appropriate Legal Notices; however, if the Program has interactive 232 | interfaces that do not display Appropriate Legal Notices, your 233 | work need not make them do so. 234 | 235 | A compilation of a covered work with other separate and independent 236 | works, which are not by their nature extensions of the covered work, 237 | and which are not combined with it such as to form a larger program, 238 | in or on a volume of a storage or distribution medium, is called an 239 | "aggregate" if the compilation and its resulting copyright are not 240 | used to limit the access or legal rights of the compilation's users 241 | beyond what the individual works permit. Inclusion of a covered work 242 | in an aggregate does not cause this License to apply to the other 243 | parts of the aggregate. 244 | 245 | 6. Conveying Non-Source Forms. 246 | 247 | You may convey a covered work in object code form under the terms 248 | of sections 4 and 5, provided that you also convey the 249 | machine-readable Corresponding Source under the terms of this License, 250 | in one of these ways: 251 | 252 | a) Convey the object code in, or embodied in, a physical product 253 | (including a physical distribution medium), accompanied by the 254 | Corresponding Source fixed on a durable physical medium 255 | customarily used for software interchange. 256 | 257 | b) Convey the object code in, or embodied in, a physical product 258 | (including a physical distribution medium), accompanied by a 259 | written offer, valid for at least three years and valid for as 260 | long as you offer spare parts or customer support for that product 261 | model, to give anyone who possesses the object code either (1) a 262 | copy of the Corresponding Source for all the software in the 263 | product that is covered by this License, on a durable physical 264 | medium customarily used for software interchange, for a price no 265 | more than your reasonable cost of physically performing this 266 | conveying of source, or (2) access to copy the 267 | Corresponding Source from a network server at no charge. 268 | 269 | c) Convey individual copies of the object code with a copy of the 270 | written offer to provide the Corresponding Source. This 271 | alternative is allowed only occasionally and noncommercially, and 272 | only if you received the object code with such an offer, in accord 273 | with subsection 6b. 274 | 275 | d) Convey the object code by offering access from a designated 276 | place (gratis or for a charge), and offer equivalent access to the 277 | Corresponding Source in the same way through the same place at no 278 | further charge. You need not require recipients to copy the 279 | Corresponding Source along with the object code. If the place to 280 | copy the object code is a network server, the Corresponding Source 281 | may be on a different server (operated by you or a third party) 282 | that supports equivalent copying facilities, provided you maintain 283 | clear directions next to the object code saying where to find the 284 | Corresponding Source. Regardless of what server hosts the 285 | Corresponding Source, you remain obligated to ensure that it is 286 | available for as long as needed to satisfy these requirements. 287 | 288 | e) Convey the object code using peer-to-peer transmission, provided 289 | you inform other peers where the object code and Corresponding 290 | Source of the work are being offered to the general public at no 291 | charge under subsection 6d. 292 | 293 | A separable portion of the object code, whose source code is excluded 294 | from the Corresponding Source as a System Library, need not be 295 | included in conveying the object code work. 296 | 297 | A "User Product" is either (1) a "consumer product", which means any 298 | tangible personal property which is normally used for personal, family, 299 | or household purposes, or (2) anything designed or sold for incorporation 300 | into a dwelling. In determining whether a product is a consumer product, 301 | doubtful cases shall be resolved in favor of coverage. For a particular 302 | product received by a particular user, "normally used" refers to a 303 | typical or common use of that class of product, regardless of the status 304 | of the particular user or of the way in which the particular user 305 | actually uses, or expects or is expected to use, the product. A product 306 | is a consumer product regardless of whether the product has substantial 307 | commercial, industrial or non-consumer uses, unless such uses represent 308 | the only significant mode of use of the product. 309 | 310 | "Installation Information" for a User Product means any methods, 311 | procedures, authorization keys, or other information required to install 312 | and execute modified versions of a covered work in that User Product from 313 | a modified version of its Corresponding Source. The information must 314 | suffice to ensure that the continued functioning of the modified object 315 | code is in no case prevented or interfered with solely because 316 | modification has been made. 317 | 318 | If you convey an object code work under this section in, or with, or 319 | specifically for use in, a User Product, and the conveying occurs as 320 | part of a transaction in which the right of possession and use of the 321 | User Product is transferred to the recipient in perpetuity or for a 322 | fixed term (regardless of how the transaction is characterized), the 323 | Corresponding Source conveyed under this section must be accompanied 324 | by the Installation Information. But this requirement does not apply 325 | if neither you nor any third party retains the ability to install 326 | modified object code on the User Product (for example, the work has 327 | been installed in ROM). 328 | 329 | The requirement to provide Installation Information does not include a 330 | requirement to continue to provide support service, warranty, or updates 331 | for a work that has been modified or installed by the recipient, or for 332 | the User Product in which it has been modified or installed. Access to a 333 | network may be denied when the modification itself materially and 334 | adversely affects the operation of the network or violates the rules and 335 | protocols for communication across the network. 336 | 337 | Corresponding Source conveyed, and Installation Information provided, 338 | in accord with this section must be in a format that is publicly 339 | documented (and with an implementation available to the public in 340 | source code form), and must require no special password or key for 341 | unpacking, reading or copying. 342 | 343 | 7. Additional Terms. 344 | 345 | "Additional permissions" are terms that supplement the terms of this 346 | License by making exceptions from one or more of its conditions. 347 | Additional permissions that are applicable to the entire Program shall 348 | be treated as though they were included in this License, to the extent 349 | that they are valid under applicable law. If additional permissions 350 | apply only to part of the Program, that part may be used separately 351 | under those permissions, but the entire Program remains governed by 352 | this License without regard to the additional permissions. 353 | 354 | When you convey a copy of a covered work, you may at your option 355 | remove any additional permissions from that copy, or from any part of 356 | it. (Additional permissions may be written to require their own 357 | removal in certain cases when you modify the work.) You may place 358 | additional permissions on material, added by you to a covered work, 359 | for which you have or can give appropriate copyright permission. 360 | 361 | Notwithstanding any other provision of this License, for material you 362 | add to a covered work, you may (if authorized by the copyright holders of 363 | that material) supplement the terms of this License with terms: 364 | 365 | a) Disclaiming warranty or limiting liability differently from the 366 | terms of sections 15 and 16 of this License; or 367 | 368 | b) Requiring preservation of specified reasonable legal notices or 369 | author attributions in that material or in the Appropriate Legal 370 | Notices displayed by works containing it; or 371 | 372 | c) Prohibiting misrepresentation of the origin of that material, or 373 | requiring that modified versions of such material be marked in 374 | reasonable ways as different from the original version; or 375 | 376 | d) Limiting the use for publicity purposes of names of licensors or 377 | authors of the material; or 378 | 379 | e) Declining to grant rights under trademark law for use of some 380 | trade names, trademarks, or service marks; or 381 | 382 | f) Requiring indemnification of licensors and authors of that 383 | material by anyone who conveys the material (or modified versions of 384 | it) with contractual assumptions of liability to the recipient, for 385 | any liability that these contractual assumptions directly impose on 386 | those licensors and authors. 387 | 388 | All other non-permissive additional terms are considered "further 389 | restrictions" within the meaning of section 10. If the Program as you 390 | received it, or any part of it, contains a notice stating that it is 391 | governed by this License along with a term that is a further 392 | restriction, you may remove that term. If a license document contains 393 | a further restriction but permits relicensing or conveying under this 394 | License, you may add to a covered work material governed by the terms 395 | of that license document, provided that the further restriction does 396 | not survive such relicensing or conveying. 397 | 398 | If you add terms to a covered work in accord with this section, you 399 | must place, in the relevant source files, a statement of the 400 | additional terms that apply to those files, or a notice indicating 401 | where to find the applicable terms. 402 | 403 | Additional terms, permissive or non-permissive, may be stated in the 404 | form of a separately written license, or stated as exceptions; 405 | the above requirements apply either way. 406 | 407 | 8. Termination. 408 | 409 | You may not propagate or modify a covered work except as expressly 410 | provided under this License. Any attempt otherwise to propagate or 411 | modify it is void, and will automatically terminate your rights under 412 | this License (including any patent licenses granted under the third 413 | paragraph of section 11). 414 | 415 | However, if you cease all violation of this License, then your 416 | license from a particular copyright holder is reinstated (a) 417 | provisionally, unless and until the copyright holder explicitly and 418 | finally terminates your license, and (b) permanently, if the copyright 419 | holder fails to notify you of the violation by some reasonable means 420 | prior to 60 days after the cessation. 421 | 422 | Moreover, your license from a particular copyright holder is 423 | reinstated permanently if the copyright holder notifies you of the 424 | violation by some reasonable means, this is the first time you have 425 | received notice of violation of this License (for any work) from that 426 | copyright holder, and you cure the violation prior to 30 days after 427 | your receipt of the notice. 428 | 429 | Termination of your rights under this section does not terminate the 430 | licenses of parties who have received copies or rights from you under 431 | this License. If your rights have been terminated and not permanently 432 | reinstated, you do not qualify to receive new licenses for the same 433 | material under section 10. 434 | 435 | 9. Acceptance Not Required for Having Copies. 436 | 437 | You are not required to accept this License in order to receive or 438 | run a copy of the Program. Ancillary propagation of a covered work 439 | occurring solely as a consequence of using peer-to-peer transmission 440 | to receive a copy likewise does not require acceptance. However, 441 | nothing other than this License grants you permission to propagate or 442 | modify any covered work. These actions infringe copyright if you do 443 | not accept this License. Therefore, by modifying or propagating a 444 | covered work, you indicate your acceptance of this License to do so. 445 | 446 | 10. Automatic Licensing of Downstream Recipients. 447 | 448 | Each time you convey a covered work, the recipient automatically 449 | receives a license from the original licensors, to run, modify and 450 | propagate that work, subject to this License. You are not responsible 451 | for enforcing compliance by third parties with this License. 452 | 453 | An "entity transaction" is a transaction transferring control of an 454 | organization, or substantially all assets of one, or subdividing an 455 | organization, or merging organizations. If propagation of a covered 456 | work results from an entity transaction, each party to that 457 | transaction who receives a copy of the work also receives whatever 458 | licenses to the work the party's predecessor in interest had or could 459 | give under the previous paragraph, plus a right to possession of the 460 | Corresponding Source of the work from the predecessor in interest, if 461 | the predecessor has it or can get it with reasonable efforts. 462 | 463 | You may not impose any further restrictions on the exercise of the 464 | rights granted or affirmed under this License. For example, you may 465 | not impose a license fee, royalty, or other charge for exercise of 466 | rights granted under this License, and you may not initiate litigation 467 | (including a cross-claim or counterclaim in a lawsuit) alleging that 468 | any patent claim is infringed by making, using, selling, offering for 469 | sale, or importing the Program or any portion of it. 470 | 471 | 11. Patents. 472 | 473 | A "contributor" is a copyright holder who authorizes use under this 474 | License of the Program or a work on which the Program is based. The 475 | work thus licensed is called the contributor's "contributor version". 476 | 477 | A contributor's "essential patent claims" are all patent claims 478 | owned or controlled by the contributor, whether already acquired or 479 | hereafter acquired, that would be infringed by some manner, permitted 480 | by this License, of making, using, or selling its contributor version, 481 | but do not include claims that would be infringed only as a 482 | consequence of further modification of the contributor version. For 483 | purposes of this definition, "control" includes the right to grant 484 | patent sublicenses in a manner consistent with the requirements of 485 | this License. 486 | 487 | Each contributor grants you a non-exclusive, worldwide, royalty-free 488 | patent license under the contributor's essential patent claims, to 489 | make, use, sell, offer for sale, import and otherwise run, modify and 490 | propagate the contents of its contributor version. 491 | 492 | In the following three paragraphs, a "patent license" is any express 493 | agreement or commitment, however denominated, not to enforce a patent 494 | (such as an express permission to practice a patent or covenant not to 495 | sue for patent infringement). To "grant" such a patent license to a 496 | party means to make such an agreement or commitment not to enforce a 497 | patent against the party. 498 | 499 | If you convey a covered work, knowingly relying on a patent license, 500 | and the Corresponding Source of the work is not available for anyone 501 | to copy, free of charge and under the terms of this License, through a 502 | publicly available network server or other readily accessible means, 503 | then you must either (1) cause the Corresponding Source to be so 504 | available, or (2) arrange to deprive yourself of the benefit of the 505 | patent license for this particular work, or (3) arrange, in a manner 506 | consistent with the requirements of this License, to extend the patent 507 | license to downstream recipients. "Knowingly relying" means you have 508 | actual knowledge that, but for the patent license, your conveying the 509 | covered work in a country, or your recipient's use of the covered work 510 | in a country, would infringe one or more identifiable patents in that 511 | country that you have reason to believe are valid. 512 | 513 | If, pursuant to or in connection with a single transaction or 514 | arrangement, you convey, or propagate by procuring conveyance of, a 515 | covered work, and grant a patent license to some of the parties 516 | receiving the covered work authorizing them to use, propagate, modify 517 | or convey a specific copy of the covered work, then the patent license 518 | you grant is automatically extended to all recipients of the covered 519 | work and works based on it. 520 | 521 | A patent license is "discriminatory" if it does not include within 522 | the scope of its coverage, prohibits the exercise of, or is 523 | conditioned on the non-exercise of one or more of the rights that are 524 | specifically granted under this License. You may not convey a covered 525 | work if you are a party to an arrangement with a third party that is 526 | in the business of distributing software, under which you make payment 527 | to the third party based on the extent of your activity of conveying 528 | the work, and under which the third party grants, to any of the 529 | parties who would receive the covered work from you, a discriminatory 530 | patent license (a) in connection with copies of the covered work 531 | conveyed by you (or copies made from those copies), or (b) primarily 532 | for and in connection with specific products or compilations that 533 | contain the covered work, unless you entered into that arrangement, 534 | or that patent license was granted, prior to 28 March 2007. 535 | 536 | Nothing in this License shall be construed as excluding or limiting 537 | any implied license or other defenses to infringement that may 538 | otherwise be available to you under applicable patent law. 539 | 540 | 12. No Surrender of Others' Freedom. 541 | 542 | If conditions are imposed on you (whether by court order, agreement or 543 | otherwise) that contradict the conditions of this License, they do not 544 | excuse you from the conditions of this License. If you cannot convey a 545 | covered work so as to satisfy simultaneously your obligations under this 546 | License and any other pertinent obligations, then as a consequence you may 547 | not convey it at all. For example, if you agree to terms that obligate you 548 | to collect a royalty for further conveying from those to whom you convey 549 | the Program, the only way you could satisfy both those terms and this 550 | License would be to refrain entirely from conveying the Program. 551 | 552 | 13. Use with the GNU Affero General Public License. 553 | 554 | Notwithstanding any other provision of this License, you have 555 | permission to link or combine any covered work with a work licensed 556 | under version 3 of the GNU Affero General Public License into a single 557 | combined work, and to convey the resulting work. The terms of this 558 | License will continue to apply to the part which is the covered work, 559 | but the special requirements of the GNU Affero General Public License, 560 | section 13, concerning interaction through a network will apply to the 561 | combination as such. 562 | 563 | 14. Revised Versions of this License. 564 | 565 | The Free Software Foundation may publish revised and/or new versions of 566 | the GNU General Public License from time to time. Such new versions will 567 | be similar in spirit to the present version, but may differ in detail to 568 | address new problems or concerns. 569 | 570 | Each version is given a distinguishing version number. If the 571 | Program specifies that a certain numbered version of the GNU General 572 | Public License "or any later version" applies to it, you have the 573 | option of following the terms and conditions either of that numbered 574 | version or of any later version published by the Free Software 575 | Foundation. If the Program does not specify a version number of the 576 | GNU General Public License, you may choose any version ever published 577 | by the Free Software Foundation. 578 | 579 | If the Program specifies that a proxy can decide which future 580 | versions of the GNU General Public License can be used, that proxy's 581 | public statement of acceptance of a version permanently authorizes you 582 | to choose that version for the Program. 583 | 584 | Later license versions may give you additional or different 585 | permissions. However, no additional obligations are imposed on any 586 | author or copyright holder as a result of your choosing to follow a 587 | later version. 588 | 589 | 15. Disclaimer of Warranty. 590 | 591 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY 592 | APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT 593 | HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY 594 | OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, 595 | THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 596 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM 597 | IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF 598 | ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 599 | 600 | 16. Limitation of Liability. 601 | 602 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING 603 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS 604 | THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY 605 | GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE 606 | USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF 607 | DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD 608 | PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), 609 | EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF 610 | SUCH DAMAGES. 611 | 612 | 17. Interpretation of Sections 15 and 16. 613 | 614 | If the disclaimer of warranty and limitation of liability provided 615 | above cannot be given local legal effect according to their terms, 616 | reviewing courts shall apply local law that most closely approximates 617 | an absolute waiver of all civil liability in connection with the 618 | Program, unless a warranty or assumption of liability accompanies a 619 | copy of the Program in return for a fee. 620 | 621 | END OF TERMS AND CONDITIONS 622 | 623 | How to Apply These Terms to Your New Programs 624 | 625 | If you develop a new program, and you want it to be of the greatest 626 | possible use to the public, the best way to achieve this is to make it 627 | free software which everyone can redistribute and change under these terms. 628 | 629 | To do so, attach the following notices to the program. It is safest 630 | to attach them to the start of each source file to most effectively 631 | state the exclusion of warranty; and each file should have at least 632 | the "copyright" line and a pointer to where the full notice is found. 633 | 634 | 635 | Copyright (C) 636 | 637 | This program is free software: you can redistribute it and/or modify 638 | it under the terms of the GNU General Public License as published by 639 | the Free Software Foundation, either version 3 of the License, or 640 | (at your option) any later version. 641 | 642 | This program is distributed in the hope that it will be useful, 643 | but WITHOUT ANY WARRANTY; without even the implied warranty of 644 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 645 | GNU General Public License for more details. 646 | 647 | You should have received a copy of the GNU General Public License 648 | along with this program. If not, see . 649 | 650 | Also add information on how to contact you by electronic and paper mail. 651 | 652 | If the program does terminal interaction, make it output a short 653 | notice like this when it starts in an interactive mode: 654 | 655 | Copyright (C) 656 | This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. 657 | This is free software, and you are welcome to redistribute it 658 | under certain conditions; type `show c' for details. 659 | 660 | The hypothetical commands `show w' and `show c' should show the appropriate 661 | parts of the General Public License. Of course, your program's commands 662 | might be different; for a GUI interface, you would use an "about box". 663 | 664 | You should also get your employer (if you work as a programmer) or school, 665 | if any, to sign a "copyright disclaimer" for the program, if necessary. 666 | For more information on this, and how to apply and follow the GNU GPL, see 667 | . 668 | 669 | The GNU General Public License does not permit incorporating your program 670 | into proprietary programs. If your program is a subroutine library, you 671 | may consider it more useful to permit linking proprietary applications with 672 | the library. If this is what you want to do, use the GNU Lesser General 673 | Public License instead of this License. But first, please read 674 | . 675 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Background 2 | 3 | Cloud security must be threat-informed. This repository compiles public data on security incidents impacting AWS customers, to guide prioritized security investment. 4 | 5 | This repository seeks to index all publicly disclosed AWS customer security incidents with a known root cause. 6 | 7 | It will exclude incidents involving exposed data stores (e.g S3 bucket leaks, exposed managed or hosted databases). Those incidents are already well understood, and examples can be found cataloged in places like [nagwww's s3-leaks repo](https://github.com/nagwww/s3-leaks), [upguard's reports](https://www.upguard.com/breaches), [hackmeggedon's annual rollup reports (2022)](https://www.hackmageddon.com/2022/02/21/leaky-buckets-in-2022/) and [Corey Quinn's LWIAWS](https://www.lastweekinaws.com) S3 Bucket Negligence Award. 8 | 9 | 10 | ### A Note on Blameless Postmortems 11 | 12 | This repository is in no way intended as a criticism of the listed companies. In the spirit of blameless postmortems [1](#1), our goal is to learn from incidents without an atmosphere of blame. 13 | 14 | # Catalog of AWS Customer Security Incidents 15 | 16 | A repository of breaches of AWS customers 17 | 18 | | Name | Date | Root Cause | Escalation Vector(s) | Impact | Link to details| 19 | | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | 20 | | Uber | 2014, May | GitHub Gist (data analysis script) with AWS credentials | N/A | 50,000 records, including names and driver’s licenses from S3 hosted database prunes | [Exclusive: In lawsuit over hacking, Uber probes IP address assigned to Lyft exec - sources ](https://www.reuters.com/article/uk-uber-tech-lyft-hacking-exclusive/exclusive-in-lawsuit-over-hacking-uber-probes-ip-address-assigned-to-lyft-exec-sources-idUKKCN0S20D020151008), [A blameless post-mortem of USA v. Joseph Sullivan](https://magoo.medium.com/a-blameless-post-mortem-of-usa-v-joseph-sullivan-a137162f7fc9) | 21 | | Code Spaces | 2014, June | AWS Console Credentials (Phishing?) | Attacker created additional accounts/access keys | Wiped S3 buckets, EC2 instances, AMIs, EBS snapshots | [Hacker puts code spaces out of business](https://threatpost.com/hacker-puts-hosting-service-code-spaces-out-of-business/106761/) | 22 | | BrowserStack | 2014, November | Shellshock on exposed, outdated prototype machine | Access keys on server, used to create IAM user, create EC2, and mount backup | Steal user data and email users | [BrowserStack analysis](http://archive.today/rsmmS) | 23 | | DNC Hack by the GRU | 2016, June | Unknown, test clusters breached | EC2 Snapshots copied to attacker AWS accounts | Tableau and Vertica Queries | [DEMOCRATIC NATIONAL COMMITTEE v. THE RUSSIAN FEDERATION](https://www.politico.com/f/?id=00000168-6161-de11-af7d-ef7327ea0000) | 24 | | DataDog | 2016, July | CI/CD AWS access key and SSH private key leaked | Attacker attempted to pivot with customer credentials | 3 EC2 instances and subset of S3 buckets | [2016-07-08 Security Notice](https://web.archive.org/web/20201128071102/https://www.datadoghq.com/blog/2016-07-08-security-notice/) | 25 | | Uber | 2016, October | ~13 Hacked Uber credentials purchased for forum gave access to private GitHub Repo with AWS credentials | N/A | Names and driver’s license numbers of 600k drivers, PII of 57 million users in unencrypted manual backup| [Uber concealed cyberattack ...](https://web.archive.org/web/20210824171652/https://www.bloomberg.com/news/articles/2017-11-21/uber-concealed-cyberattack-that-exposed-57-million-people-s-data), [A blameless post-mortem of USA v. Joseph Sullivan](https://magoo.medium.com/a-blameless-post-mortem-of-usa-v-joseph-sullivan-a137162f7fc9) | 26 | | Lynda.com | 2016, December | Private GitHub Repo with AWS credentials | N/A | User data for 9.5m users, attempted extortion | [2 Plead Guilty in 2016 Uber and Lynda.com Hacks](http://archive.today/oU2ZL) | 27 | | OneLogin | 2017, May | AWS keys | Created EC2 instances | Accessed database tables (with encrypted data) | [May 31, 2017 Security Incident](https://web.archive.org/web/20210620180614/https://www.onelogin.com/blog/may-31-2017-security-incident) | 28 | | Politifact | 2017, October | "Misconfigured cloud computing server" | N/A | Coinhive cryptojacking | [Hackers have turned Politifact’s website into a trap for your PC](https://web.archive.org/web/20200806102838/https://www.washingtonpost.com/news/the-switch/wp/2017/10/13/hackers-have-turned-politifacts-website-into-a-trap-for-your-pc/) | 29 | | Dataspline | 2017, Unknown | Monero miner in container base image dependency | N/A | Monero cryptojacking | [LinkedIn post from co-founder](https://www.linkedin.com/feed/update/urn:li:activity:7219713829528563712) | 30 | | DXC Technologies | 2017, November | Private AWS key exposed via GitHub | 244 EC2 instance started | Cryptomining | [DXC spills AWS private keys on public GitHub](https://web.archive.org/web/20210228215919/https://www.theregister.com/2017/11/14/dxc_github_aws_keys_leaked/) | 31 | | Drizly | 2018 | AWS Credentials committed to public github repo | N/A | Cryptojacking | [FEDERAL TRADE COMMISSION - Drizly Complaint](https://www.ftc.gov/news-events/news/press-releases/2022/10/ftc-takes-action-against-drizly-its-ceo-james-cory-rellas-security-failures-exposed-data-25-million) | 32 | | LA Times | 2018, February | S3 global write access | N/A | Cryptojacking | [Coinhive cryptojacking added to homicide.latimes.com](https://web.archive.org/web/20210413201832/https://www.tripwire.com/state-of-security/security-data-protection/la-times-website-cryptojacking-attack/) | 33 | | Tesla | 2018, February | Globally exposed Kubernetes console, Pod with AWS credentials | N/A | Cryptojacking | [Hack Brief: Hackers Enlisted Tesla's Public Cloud to Mine Cryptocurrency](https://www.wired.com/story/cryptojacking-tesla-amazon-cloud/) | 34 | | Chegg | 2018, April | Former contractor abuses broadly shared root credential | Unknown | 40 million users' data (from S3 bucket) | [FTC Complaint](https://www.ftc.gov/system/files/ftc_gov/pdf/2023151-Chegg-Complaint.pdf) | 35 | | imToken | 2018, June | Email account compromise | Reset AWS account password | Minimal customer device data | [ Disclosure of Security Incidents on imToken ](https://archive.ph/bRjXi) | 36 | | Voova | 2019, March | Stolen credentials by former employee | N/A | Deleted 23 servers | [Sacked IT guy annihilates 23 of his ex-employer’s AWS servers](https://nakedsecurity.sophos.com/2019/03/22/sacked-it-guy-annihilates-23-of-his-ex-employers-aws-servers/) | 37 | | Capital One | 2019, April | "Misconfigured WAF" that allowed for a SSRF attack | Over-privileged EC2 Role | 100 million credit applications | [A Technical Analysis of the Capital One Cloud Misconfiguration Breach](https://cloudsecurityalliance.org/blog/2019/08/09/a-technical-analysis-of-the-capital-one-cloud-misconfiguration-breach) | 38 | | JW Player | 2019, September | Weave Scope (publicly exposed), RCE by design | N/A | Cryptojacking | [How A Cryptocurrency Miner Made Its Way onto Our Internal Kubernetes Clusters](https://web.archive.org/web/20210828044334/https://medium.com/jw-player-engineering/how-a-cryptocurrency-miner-made-its-way-onto-our-internal-kubernetes-clusters-9b09c4704205) | 39 | | Malindo Air | 2019, September | Former employee insider threat | N/A | 35 million PII records | [ Malindo Air: Data Breach Was Inside Job](https://www.infosecurity-magazine.com/news/malindo-air-data-breach-was-inside/) | 40 | | Imperva | 2019, October | “Internal compute instance” globally accessible, “Contained” AWS API key | N/A | RDS snapshot stolen | [Imperva Security Update](https://web.archive.org/web/20210620143023/https://www.imperva.com/blog/ceoblog/) | 41 | | Cameo | 2020, February | Credentials in mobile app package | N/A | Access to backend infrastructure, including user data | [Celeb Shout-Out App Cameo Exposes Private Videos and User Data](https://www.vice.com/en/article/akwj5z/cameo-app-exposed-private-videos-user-data-passwords) | 42 | | Open Exchange Rates | 2020, March | Third-party compromise exposing access key | N/A | User database | [Exchange rate service’s customer details hacked via AWS](https://nakedsecurity.sophos.com/2020/03/20/exchange-rate-services-customer-details-hacked-via-aws/) | 43 | | First Republic Bank | 2020, March | Fired employee incompletely offboarded | N/A | System interruption | [First Republic Bank](https://www.breaches.cloud/incidents/first-republic/) | 44 | | Live Auctioneers | 2020, July | Compromised third party software granting access to cloud environment | N/A | User database, including MD5 hashed credentials | [Washington State OAG - Live Auctioneers](https://www.atg.wa.gov/live-auctioneers/) | 45 | | Twilio | 2020, July |S3 global write access | N/A | Magecart[2](#2) | [Incident Report: TaskRouter JS SDK Security Incident](https://web.archive.org/web/20210813010417/https://www.twilio.com/blog/incident-report-taskrouter-js-sdk-july-2020) | 46 | | Natures Basket responsible disclosure | 2020, July | Hard-coded root keys in source code exposed via public S3 bucket | N/A | N/A | [GotRoot! AWS root Account Takeover](https://web.archive.org/web/20200825004529/https://medium.com/@gchib/naturesbasket-aws-root-account-takeover-e4aa5c5e95e1) | 47 | | Drizly | 2020, July | Inactive GitHub account compromised via reused password, granting AWS credential access in source code | N/A | RDS Instance with 2.5 million users data exfiltrated | [FTC Takes Action Against Drizly and its CEO James Cory Rellas for Security Failures that Exposed Data of 2.5 Million Consumers](https://archive.ph/p21Vk) | 48 | | Cryptomining AMI | 2020, August | Windows 2008 Server Community AMI | N/A | Monero miner | [Cryptominer Found Embedded in AWS Community AMI](https://web.archive.org/web/20210625192906/https://www.darkreading.com/cloud/cryptominer-found-embedded-in-aws-community-ami/d/d-id/1338713/) | 49 | | Animal Jam | 2020, November | Slack compromise exposes AWS credentials | N/A | User database | [Kids' gaming website Animal Jam breached](https://web.archive.org/web/20210122070047/https://www.theregister.com/2020/11/12/animal_jam_breached/) | 50 | | Cisco | 2020, December | Former employee with AWS access 5 months post-resignation | N/A | Deleted \~450 EC2 instances | [Former Cisco engineer sentenced to prison](https://web.archive.org/web/20210304053727/https://www.zdnet.com/article/former-cisco-engineer-sentenced-to-prison-for-deleting-16k-webex-accounts/) | 51 | | Juspay | 2021, January | Compromised old, unrecycled Amazon Web Services (AWS) access key | N/A | Masked card data, email IDs and phone numbers | [Data from August Breach of Amazon Partner Juspay Dumped Online](https://web.archive.org/web/20210127001214/https://threatpost.com/data-from-august-breach-of-amazon-partner-juspay-dumped-online/162740/) | 52 | | 20/20 Eye Care Network and Hearing Care Network | 2021, January | Compromised credential | N/A | S3 buckets accessed then deleted | [20/20 Eye Care Network and Hearing Care Network notify 3,253,822 health plan members of breach that deleted contents of AWS buckets](https://www.databreaches.net/20-20-eye-care-network-and-hearing-care-network-notify-3253822-health-plan-members-of-breach-that-deleted-contents-of-aws-buckets/) | 53 | | Sendtech | 2021, February | (Current or former employee) Compromised credentials | Created additional admin account | Accessed customer data in S3 | [PERSONAL DATA PROTECTION COMMISSION Case No. DP-2102-B7884](https://web.archive.org/web/20220923025502/https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Decision---Sendtech-Pte-Ltd---220721.ashx?la=en) | 54 | | LogicGate | 2021, April | Compromised credentials | N/A | Backup files in S3 stolen | [Risk startup LogicGate confirms data breach](https://web.archive.org/web/20210519233848/https://techcrunch.com/2021/04/13/logicgate-risk-cloud-data-breach/) | 55 | | Ubiquiti | 2021, April | Compromised credentials from IT employee Lastpass (alleged former employee insider threat) | N/A | root administrator access to all AWS accounts, extortion | [Ubiquiti All But Confirms Breach Response Iniquity](https://web.archive.org/web/20210731152054/https://krebsonsecurity.com/2021/04/ubiquiti-all-but-confirms-breach-response-iniquity/) | 56 | | Uran Company | 2021, July | Compromised Drupal with API keys | N/A | Cryptomining | [Clear and Uncommon Story About Overcoming Issues With AWS](https://web.archive.org/web/20221205145546/https://topdigital.agency/clear-and-uncommon-story-about-overcoming-issues-with-aws/) | 57 | | reddoorz.com | 2021, September | Access Key leaked via APK | N/A | Customer database stolen | [PERSONAL DATA PROTECTION COMMISSION Case No. DP-2009-B7057](https://web.archive.org/web/20211130202805/https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Commissions-Decisions/Decision---Commeasure-Pte-Ltd---15092021.pdf?la=en) | 58 | | HPE Aruba | 2021, October | Unknown exposure of Access Key | N/A | Potential access to network telemetry and contact trace data | [Aruba Central Security Incident](https://www.arubanetworks.com/support-services/security-bulletins/central-incident-faq/) | 59 | | Kaspersky | 2021, November | Compromised SES token from third party | N/A | Phishing attacks | [Kaspersky's stolen Amazon SES token used in Office 365 phishing](https://www.bleepingcomputer.com/news/security/kasperskys-stolen-amazon-ses-token-used-in-office-365-phishing/) | 60 | | Eye Care Leaders | 2021, December | Unknown | Unknown | deleted databases and system configuration files, potential theft of [1.5M patient records](https://healthitsecurity.com/news/eye-care-leaders-emr-breach-impacts-at-least-342k-individuals) | [Augusta University Health - Breach Disclosure [PDF]](https://dojmt.gov/wp-content/uploads/Augusta-University-Medical-Center-Consumer-Notification-Letter.pdf) | 61 | | Onus | 2021, December | Log4Shell vulnerability in Cyclos server | AmazonS3FullAccess creds (and DB creds) in Cyclos config | 2 million ONUS users’ information including EKYC data, personal information, and password hash was leaked. | [The attack on ONUS – A real-life case of the Log4Shell vulnerability](https://cystack.net/research/the-attack-on-onus-a-real-life-case-of-the-log4shell-vulnerability) | 62 | | Flexbooker | 2021, December | Unknown | Unknown | 3.7M first and last names, email addresses, phone numbers, "encrypted" passwords | [Booking management platform FlexBooker leaks 3.7 million user records](https://therecord.media/booking-management-platform-flexbooker-leaks-3-7-million-user-records/) | 63 | | npm | 2022, April | Third party OAuth token compromise granting private repository access, containing AWS keys | Unknown | 100k users data (from 2015) | [npm security update: Attack campaign using stolen OAuth tokens](https://github.blog/2022-05-26-npm-security-update-oauth-tokens/) | 64 | | PREMINT | 2022, July | S3 global write access | Unknown | NFT Theft (supply chain) | [Full Analysis of the PREMINT Attack Incident](https://www.chaincatcher.com/en/article/2076680) | 65 | | Uber | 2022, September | Contractor account compromise leading to AWS credential discovery on a shared drive | Unknown | N/A | [Uber - Security update](https://www.uber.com/newsroom/security-update/) | 66 | | Lastpass | 2022, October | Stole source code and accessed development environment via compromised developer account (an IAM User) | Unknown pivot point into production environment. Later compromise of a privileged engineer's personal machine to gain access to decryption keys for stolen data | Internal and customer data broadly compromised, including backups of MFA database | [Notice of Recent Security Incident](https://support.lastpass.com/help/incident-2-additional-details-of-the-attack),[Incident 2 – Additional details of the attack](https://support.lastpass.com/help/incident-2-additional-details-of-the-attack), [Breaking the Vault: A Case Study of the 2022 LastPass Data Breach](https://arxiv.org/pdf/2502.04287) | 67 | | Medibank | 2022, October | Compromised credentials | Unknown | Data exfiltration from Redshift / "Ransomware" | [Medibank now says hackers accessed all its customers’ personal data](https://www.bleepingcomputer.com/news/security/medibank-now-says-hackers-accessed-all-its-customers-personal-data/), [Amazon Redshift gets new default settings to prevent data breaches](https://www.bleepingcomputer.com/news/security/amazon-redshift-gets-new-default-settings-to-prevent-data-breaches/) | 68 | | Sonder | 2022, November | Unknown | Unknown | Theft of customer information, attempted extortion | [Security Update](https://blog.sonder.com/news/security-update/), [Breach Notification](https://dojmt.gov/wp-content/uploads/Consumer-Notification-Letter-816.pdf) | 69 | | Teqtivity (Uber Vendor) | 2022, December | Unknown | Unknown | "AWS backup server" with device and user information | [Breach Notification Statement](https://www.teqtivity.com/breach-notification-statement), [Uber suffers new data breach after attack on vendor, info leaked online](https://www.bleepingcomputer.com/news/security/uber-suffers-new-data-breach-after-attack-on-vendor-info-leaked-online/) | 70 | | CommuteAir | 2023, January | Publicly Exposed Jenkins with hardcoded credentials | N/A | 2019 FAA No Fly List | [how to completely own an airline in 3 easy steps](https://maia.crimew.gay/posts/how-to-hack-an-airline/), [U.S. airline accidentally exposes ‘No Fly List’ on unsecured server](https://www.dailydot.com/debug/no-fly-list-us-tsa-unprotected-server-commuteair/) | 71 | | Cloudflare | 2023, November | Pivot from Okta compromise due to un-rotated access token | N/A | N/A | [Cloudflare - Thanksgiving 2023 security incident](https://web.archive.org/web/20240201200520/https://blog.cloudflare.com/thanksgiving-2023-security-incident/) | 72 | | Sisense | 2024, April | Credentials stolen from Gitlab repository | N/A | Terabytes of customer data exfiltrated from S3 | [Why CISA is Warning CISOs About a Breach at Sisense](https://krebsonsecurity.com/2024/04/why-cisa-is-warning-cisos-about-a-breach-at-sisense/) | 73 | | pcTattletale | 2024, May | Application vulnerability disclosed `root` AWS keys | N/A | Data published publicly | [Spyware app pcTattletale was hacked and its website defaced](https://techcrunch.com/2024/05/25/spyware-app-pctattletale-was-hacked-and-its-website-defaced/), [defaced site](https://web.archive.org/web/20240525013915/https://www.pctattletale.com/) | 74 | | BeyondTrust | 2024, December | 0day vulnerability in a 3p application | infrastructure API key to pivot cross-account | Customer Instances compromised | [BeyondTrust Remote Support SaaS Service Security Investigation](https://www.beyondtrust.com/remote-support-saas-service-security-investigation) | 75 | | TinaCloud | 2024, December | Credentials leaked in JS file | N/A | SES abuse for phishing | [TinaCloud: Public Disclosure of Security Breach](https://tina.io/blog/2024-12-tinacloud-public-disclosure-security-breach) | 76 | | Otelier | 2025, January | Infostealer | Credentials found in Bitbucket | 8TB of data exfiltrated from S3 | [Otelier data breach exposes info, hotel reservations of millions](https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/) | 77 | | Bybit / Safe{Wallet} | 2025, February | Compromised developer machine | Malicious JavaScript via S3 bucket write access | $1.5 Billion dollars stolen | [Bybit Interim Investigation Reports](https://docsend.com/view/s/rmdi832mpt8u93s7#) | 78 | | AngelOne | 2025, March | Unknown | N/A | Data exfiltration | [Indian Stock Broker Angel One Discloses Data Breach](https://www.securityweek.com/indian-stock-broker-angel-one-discloses-data-breach/) | 79 | | Pearson | 2025, March | Exposed GitLab token in `.git/config` | AWS credentials in source code | Data exfiltration | [Education giant Pearson hit by cyberattack exposing customer data](https://www.bleepingcomputer.com/news/security/education-giant-pearson-hit-by-cyberattack-exposing-customer-data/) | 80 | | KiranaPro | 2025, June | Former employee, post layoff | N/A | Service disruption | [Indian grocery startup KiranaPro was hacked and its servers deleted, CEO confirms](https://techcrunch.com/2025/06/03/indian-grocery-startup-kiranapro-was-hacked-and-its-servers-deleted-ceo-confirms/), [KiranaPro Crisis Explained: Ex-Employee’s Revenge Move that Paralysed the App](https://www.outlookbusiness.com/start-up/explainers/kiranapro-crisis-explained-ex-employees-revenge-move-that-paralysed-the-app) | 81 | | Kodex | 2025, October | Fraudulent legal domain transfer order | N/A | Outage when domain frozen | [Subpoena tracking platform blames outage on AWS social engineering attack](https://www.theregister.com/2025/10/02/subpoena_tracking_platform_outage_blamed/) | 82 | | Kiln | 2025, October | Compromised GitHub Access Token | Credentials stolen from GitHub Actions, modify running API logic | Cryptocurrency theft | [Re-enablement of Kiln services and security incident information](https://www.kiln.fi/post/re-enablement-of-kiln-services-and-security-incident-information#) | 83 | 84 | 85 | ## Vendor-reported AWS Customer Security Incident Case Studies 86 | 87 | | Report | Date | Root Cause | Escalation or Peristence Vector(s) | Impact | Link to details| 88 | | ------------- | ------------- | ------------- | ------------- | ------------- | ------------- | 89 | | Mandiant M-Trends 2020 | 2020, February | Credentials stolen from GitHub repository commit history | Takes snapshot of EBS volumes, creates EC2 instances, exfiltrates data over SSH | Stolen EBS volumes | [M-Trends 2020](https://web.archive.org/https://www.mandiant.com/sites/default/files/2021-09/mtrends-2020.pdf) | 90 | | TeamTNT Worm | 2020, April | Misconfigured Docker & k8s platforms | Steals AWS credentials from \~/.aws/* | Cryptojacking for Monero | [Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials](https://web.archive.org/web/20210607223609/https://www.cadosecurity.com/post/team-tnt-the-first-crypto-mining-worm-to-steal-aws-credentials/), [TeamTNT with new campaign aka “Chimaera”](https://cybersecurity.att.com/blogs/labs-research/teamtnt-with-new-campaign-aka-chimaera) | 91 | | Expel case study 1 | 2020, April | 8 IAM access keys compromised | Backdoored security groups | Command line access to EC2 instances | [Finding evil in AWS: A key pair to remember](https://web.archive.org/web/20210226132628/https://expel.io/blog/finding-evil-in-aws/) | 92 | | Expel case study 2 | 2020, July | Root IAM user access keycompromised | SSH keys generated for EC2 instances | Cryptojacking | [Behind the scenes in the Expel SOC: Alert-to-fix in AWS](https://web.archive.org/web/20210128055101/https://expel.io/blog/behind-the-scenes-expel-soc-alert-aws/) | 93 | | Mandiant: Insider Threat Scenario | 2020, September | Fired employee uses credentials | Access CI/CD server, create a new user, steal credentials | Deleted production databases | [Cloud Breaches: Case Studies, Best Practices, and Pitfalls](https://web.archive.org/web/20201103091354/https://www.youtube.com/watch?v=rtEjI_5TPdw&feature=youtu.be/) | 94 | | FireEye M-Trends 2021 case study | 2021, April | Use of SSH key by former employee | Creates users and EC2 instances | Deleted RDS backups | [M-Trends 2021](https://www.arrow.com/ecs-media/16352/fireeye-rpt-mtrends-2021.pdf) | 95 | | DarkLab case study | 2021, July | Jenkins RCE | Create IAM users, use S3 Browser tool | Use environment to launch scanning, nuked account | [Trouble in Paradise](https://blog.darklab.hk/2021/07/06/trouble-in-paradise/) | 96 | | Expel case study 3 | 2022, April | Credentials in publicly available code repository | AttachUserPolicy used for privesc | Cryptojacking (prevented) | [Incident report: From CLI to console, chasing an attacker in AWS](https://expel.com/blog/incident-report-from-cli-to-console-chasing-an-attacker-in-aws/) | 97 | | Permiso case study 1 | 2022, June | Gitlab vulnerability (CVE-2021-22205) | Credentials on the system found, used to create a backup user | Cryptojacking | [Anatomy of an Attack: Exposed keys to Crypto Mining](https://web.archive.org/web/20220629061640/https://permiso.io/blog/s/anatomy-of-attack-exposed-keys-to-crypto-mining/) | 98 | | Clearvector case study | 2022, August | ADFS pivot into IAM Identity Center | N/A | N/A | [Auditing identity activity for NOBELIUM and MagicWeb in AWS](https://www.clearvector.com/blog/auditing-identity-activity-for-nobelium-and-magicweb-in-aws/) | 99 | | Positive Thinking Company case study | 2022, June | Unknown | N/A | Cryptojacking | [Mitigating a crypto jacking incident on an AWS machine from the earliest stages](https://positivethinking.tech/use-cases/mitigating-a-crypto-jacking-incident-on-an-aws-machine-from-the-earliest-stages/) | 100 | | Palo Alto Unit 42 | 2022, December | Code execution in Lambda context | Exfiltrate credentials from envvars | SES abuse for phishing | [Compromised Cloud Compute Credentials: Case Studies From the Wild](https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/) | 101 | | Permiso case study 2 | 2022, December | Exploit publicly facing software, mainly Jupyter notebooks or k8s | N/A | Credential Theft | [Cloud Cred Harvesting Campaign - Grinch Edition](https://permiso.io/blog/s/christmas-cloud-cred-harvesting-campaign/) | 102 | | Crowdstrike | 2022, December | Exploit known ForgeRock CVE | aws_consoler used to obtain pivot to console sessions without MFA | N/A | [Analysis of an Intrusion Campaign Targeting Telco and BPO Companies](https://web.archive.org/web/20230316062338/https://www.crowdstrike.com/blog/analysis-of-intrusion-campaign-targeting-telecom-and-bpo-companies) | 103 | | Expel case study 4 | 2023, January | Publicly exposed Postman server with access key credentials stored in the project’s variables | N/A | (likely) AWS SES abuse (prevented) | [Incident report: stolen AWS access keys](https://expel.com/blog/incident-report-stolen-aws-access-keys/) | 104 | | Cado Security and Invictus Incident Response | 2023, January | | N/A | | [Responding to an attack in AWS](https://awstip.com/responding-to-an-attack-in-aws-9048a1a551ac), [Part 2](https://awstip.com/responding-to-an-attack-in-aws-dae857806aa7) | 105 | | AWS | 2023, February | Key disclosure, or SSRF | N/A | N/A |[The anatomy of ransomware event targeting data residing in Amazon S3](https://aws.amazon.com/blogs/security/anatomy-of-a-ransomware-event-targeting-data-in-amazon-s3/) | 106 | | Sysdig | 2023, February | Exploit public facing k8s service | IAM creds in Lambda env vars and in S3 bucket | Data exfiltration | [SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft](https://sysdig.com/blog/cloud-breach-terraform-data-theft/) | 107 | | Invictus IR | 2023, April | exposed long-term credentials | CreateUser | data exfiltration and deletion with ransom note | [Ransomware in the cloud](https://invictus-ir.medium.com/ransomware-in-the-cloud-7f14805bbe82) | 108 | | Unit 42 | 2023, April | sim-swap grants access to 10 access keys in source code | CreateUser with increased permissions | data exfiltration and deletion with ransom note | [From SIM-Swap to Data Leak on the Dark Web](https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/reports/unit42-cloud-threat-report-volume7.pdf) | 109 | | Unit 42 | 2023, April | SSRF via known CVE and IMDSv1 | Backdoored IAM role | Cryptojacking, outbound DDOS | [From Misconfigured Firewall to Cryptojacking Botnet](https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/reports/unit42-cloud-threat-report-volume7.pdf) | 110 | | Mitiga (RSAC) #1 | 2023, April | Company repository w/ AWS keys merged to personal github | N/A | N/A | [It’s Getting Real & Hitting the Fan: 2023 Edition](https://static.rainfocus.com/rsac/us23/sess/1664697541032001cak3/finalwebsite/2023_USA23_AIR-T02_01_It%E2%80%99s_Getting_Real__Hitting_the_Fan_2023_Edition_Real_World_SaaS_Attacks_1682607053333001zlzZ.pdf?_gl=1*trgj4t*_ga*MjAwODIwNzYxLjE2NzA0MzUzODQ.*_ga_Q3JZKF3KQM*MTY4MzYzODkzMS44My4xLjE2ODM2NDEwMTQuNTkuMC4w) | 111 | | Mitiga (RSAC) #2 | 2023, April | Unknown root cause of access key compromise | N/A | Shared AMIs publicly for exfil | [It’s Getting Real & Hitting the Fan: 2023 Edition](https://static.rainfocus.com/rsac/us23/sess/1664697541032001cak3/finalwebsite/2023_USA23_AIR-T02_01_It%E2%80%99s_Getting_Real__Hitting_the_Fan_2023_Edition_Real_World_SaaS_Attacks_1682607053333001zlzZ.pdf?_gl=1*trgj4t*_ga*MjAwODIwNzYxLjE2NzA0MzUzODQ.*_ga_Q3JZKF3KQM*MTY4MzYzODkzMS44My4xLjE2ODM2NDEwMTQuNTkuMC4w) | 112 | | Kroll #1 | 2023, April | Third party compromised | N/A | Redirect DNS and Email | [ Effective AWS Incident Response: Examples and Recommendations](https://www.kroll.com/en/insights/publications/cyber/effective-aws-incident-response) | 113 | | Kroll #2 | 2023, April | Internal network compromised | Lateral movement into cloud, years of persistence | Data Exfiltration | [ Effective AWS Incident Response: Examples and Recommendations](https://www.kroll.com/en/insights/publications/cyber/effective-aws-incident-response) | 114 | | S2W Talon "Donjuji" | 2023, May | Development server with exposed environment variables containing IAM user credentials | N/A | Stole data from S3 | [Detailed Analysis of CloudDon, Cloud Data Breach of Korea e-commerce company](https://medium.com/s2wblog/detailed-analysis-of-clouddon-cloud-data-breach-of-korea-e-commerce-company-948c3a5df90d) | 115 | | Checkmarx | 2023, June | S3 bucket serving npm package bignum hijacked | N/A | Credential theft | [Hijacking S3 Buckets: New Attack Technique Exploited in the Wild by Supply Chain Attackers](https://checkmarx.com/blog/hijacking-s3-buckets-new-attack-technique-exploited-in-the-wild-by-supply-chain-attackers/) | 116 | | SentinelOne | 2023, June | CVE-2022-47986 | N/A | N/A | [Anatomy of a Cloud Incident \| SentinelOne’s Vigilance vs. IceFire Ransomware](https://www.sentinelone.com/blog/anatomy-of-a-cloud-incident-sentinelones-vigilance-v-icefire-ransomware/) | 117 | | Sysdig | 2023, July | Exploit public facing Jupyter Notebook in k8s | IAM creds, including via IMDSv2. Privilege escalation via IAM misconfiguration. Access key persistence | Cryptojacking | [SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto](https://sysdig.com/blog/scarleteel-2-0/) | 118 | | CrowdStrike | 2023, August | Exploiting RCE in a custom PHP web application | IAM creds, including via IMDS. Lateral movement via SSM | Unknown | [2023 Threat Hunting Report](https://go.crowdstrike.com/rs/281-OBQ-266/images/report-crowdstrike-2023-threat-hunting-report.pdf) | 119 | | CrowdStrike | 2023, August | web application exploit | attempts to query IMDS and connect laterally | Unknown | [2023 Cloud Risk Report](https://www.dlt.com/sites/default/files/resource-attachments/2023-09/TDSPS_Oct2023_WS_2023_Cloud_risk_report.pdf) | 120 | | Unit42 | 2023, August | Exploiting SugarCRM zero day | Access keys on EC2 hosts, Pacu + Scoutsuite scanning | DB data exfiltration | [When a Zero Day and Access Keys Collide in the Cloud: Responding to the SugarCRM Zero-Day Vulnerability](https://unit42.paloaltonetworks.com/sugarcrm-cloud-incident-black-hat/) | 121 | | AWS | 2023, August | Compromise of federated user via unknown means | Access keys on EC2 hosts, Pacu + Scoutsuite scanning | DB data exfiltration | [Two real-life examples of why limiting permissions works: Lessons from AWS CIRT - Story 1: On the hunt for credentials](https://aws.amazon.com/blogs/security/two-real-life-examples-of-why-limiting-permissions-works-lessons-from-aws-cirt/) | 122 | | AWS | 2023, August | RCE via unintentionally exposed port in ECS task definition | N/A | Cryptojacking | [Two real-life examples of why limiting permissions works: Lessons from AWS CIRT - Story 2: More instances for crypto mining](https://aws.amazon.com/blogs/security/two-real-life-examples-of-why-limiting-permissions-works-lessons-from-aws-cirt/) | 123 | | Security Joes | 2023, Sep | Exploited a vulnerable version of MinIO on an AWS EC2 instance via [evil_minIO](https://github.com/AbelChe/evil_minio) | Network reconnaissance, create windows accounts | Unknown | [New Attack Vector In The Cloud: Attackers caught exploiting Object Storage Services](https://www.securityjoes.com/post/new-attack-vector-in-the-cloud-attackers-caught-exploiting-object-storage-services) | 124 | | Unit42 | 2023, Oct | Credentials exposed on GitHub | Create EC2 instances | Monero Cryptojacking | [CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys](https://unit42.paloaltonetworks.com/malicious-operations-of-exposed-iam-keys-cryptojacking/) | 125 | | Reliaquest | 2023, Nov | Spearphishing | Hijacked Citrix VDI | Data theft (lastpass export in S3 bucket) | [Scattered Spider Attack Analysis](https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/) | 126 | | Datadog #1 | 2024, January | Leaked IAM User Key | created administrator IAM user | S3 data exfiltration, attempted cryptomining | [Tales from the cloud trenches: Amazon ECS is the new EC2 for crypto mining](https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-ecs-crypto-mining/) | 127 | | Datadog #2 | 2024, January | Leaked IAM User Key | N/A | Cryptomining (via ECS Fargate, XMRig) | [Tales from the cloud trenches: Amazon ECS is the new EC2 for crypto mining](https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-ecs-crypto-mining/) | 128 | | Invictus IR | 2024, January | Exposed IAM User (Administrator) Access Key | created administrator IAM user, added access keys for existing users, created externally assumable role | Cryptomining, SES spam/phishing, phishing infrastructure (domains) | [The curious case of DangerDev@protonmail.me](https://www.invictus-ir.com/news/the-curious-case-of-dangerdev-protonmail-me) | 129 | | Stephen Berger (InfoGuardAG) | 2024, February | Unknown | N/A | S3 Ransomware (deleted buckets) | [AWS Ransomware](https://dfir.ch/posts/aws_ransomware/) | 130 | | Sysdig | 2024, March | Exploited vulnerable Laravel + Wordpress | N/A | Meson CDN cryptomining | [Cloud Threats deploying Crypto CDN](https://sysdig.com/blog/cloud-threats-deploying-crypto-cdn/) | 131 | | Datadog | 2024, March | Compromised Credentials | N/A | AWS SNS SMS Phishing | [Tales from the cloud trenches: Using malicious AWS activity to spot phishing campaigns](https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-aws-activity-to-phishing/) | 132 | | Mandiant | 2024, April | Phishing leads to compromise of credentials in former employee's personal Google Drive | N/A | S3 data exfiltration and "Ransomware" (deleted buckets) | [Cloud compromises: Lessons learned from Mandiant investigations in 2023 - Incident Response Case Study #4](https://assets.swoogo.com/uploads/3783545-66183eb421ec0.pdf) | 133 | | Sysdig | 2024, May | Exploited known vulnerable Laravel (CVE-2021-3129) | N/A | LLMJacking | [LLMjacking: Stolen Cloud Credentials Used in New AI Attack](https://sysdig.com/blog/llmjacking-stolen-cloud-credentials-used-in-new-ai-attack/) | 134 | | Lacework | 2024, June | Stolen or compromised credentials | Create new console user | LLMJacking | [Detecting AI resource-hijacking with Composite Alerts](https://www.lacework.com/blog/detecting-ai-resource-hijacking-with-composite-alerts) | 135 | | Datadog | 2024, June | Stolen or compromised credentials | N/A | LLMJacking | [Tales from the cloud trenches: Raiding for AWS vaults, buckets and secrets](https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-raiding-for-vaults-buckets-secrets/) | 136 | | Yotam Meitar (Wiz) | 2024, June | Compromised vulnerable application (k8s Pod) | Exploit overprivileged secrets access to retrieve IDP-related credentials | S3 data exfiltration and "Ransomware" | [Responding to Sophisticated Ransom Attacks in the Cloud: A Real-World Case Study](https://www.youtube.com/watch?v=f066e7WndTQ) | 137 | | Rapid7 #1 | 2024, July | Compromised credential | Create SES user and KMS key | Data Exfiltration & Distruction | [Cloud Attack Paths Unveiled: Lessons Learned from the SOC](https://2631050.fs1.hubspotusercontent-na1.net/hubfs/2631050/1108-24/Day%201%20-%20Presentations/Daniel%20Comarmond.pdf) | 138 | | Rapid7 #2 | 2024, July | Compromised credential in public s3 | Create IAM users with SES access | SES Abuse | [Cloud Attack Paths Unveiled: Lessons Learned from the SOC](https://2631050.fs1.hubspotusercontent-na1.net/hubfs/2631050/1108-24/Day%201%20-%20Presentations/Daniel%20Comarmond.pdf) | 139 | | Unit42 | 2024, August | Exposed AWS credentials | N/A | S3 data exfiltration and extortion | [Bling Libra’s Tactical Evolution: The Threat Actor Group Behind ShinyHunters Ransomware](https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/) | 140 | | Wiz | 2024, September | Infostealer deployed via social engineering | VDP session hijack, RDP to server in cloud, extract AWS access keys | Data exfiltration | [Uncovering Hybrid Cloud Attacks Part 2 – The Attack](https://www.wiz.io/blog/uncovering-hybrid-cloud-attacks-part-2-the-attack) | 141 | | Permiso | 2024, October | Stolen or compromised credentials | N/A | LLMJacking | [When AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplaying](https://permiso.io/blog/exploiting-hosted-models) | 142 | | Datadog | 2024, December | Stolen or compromised credentials | Create new role assumable by attacker account | Targeting SES | [Tales from the cloud trenches: Unwanted visitor](https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-unwanted-visitor/#key-points-and-observations) | 143 | | Wiz | 2024, December | Stolen or compromised credentials | Create new users and access keys | LLMJacking | [New Developments in LLM Hijacking Activity](https://www.wiz.io/blog/jinx-2401-llm-hijacking-aws) | 144 | | Sygnia | 2025, January | Infostealer deployed via social engineering | Lambda PrivEsc to execute commands on EC2 instance | "API calls" to "critical assets" | [Sygnia’s 2025 Field Report](https://www.sygnia.co/blog/sygnia-2025-field-report-identity-based-attacks/) | 145 | | Expel | 2025, February | Phishing/Smishing compromising Okta identities | N/A | N/A | [Expel's 2025 Annual Threat Report - Scattered Spider](https://expel.com/wp-content/uploads/2025/01/Expel-Annual-Threat-Report-2025-013025.pdf) | 146 | | Badshah | 2025, April | Stolen or compromised credentials | N/A | Exfiltration and deletion | [Securing a SaaS Company's AWS Environment After a Breach](https://badshah.io/case-studies/saas-aws-breach/) | 147 | | Mandiant M-Trends 2025 | 2025, April | Stolen or compromised credentials | N/A | Mining, LLMJacking, Resale | [M-Trends 2025: TRIPLESTRENGTH Leverages Stolen Credentials for Cloud Assets for Illicit Cryptocurrency Mining](https://services.google.com/fh/files/misc/m-trends-2025-en.pdf) | 148 | | Datadog | 2025, March | Leaked credentials | Create Admin IAM Users, Lambda persistence, AWS SSO Persistence | N/A | [Tales from the cloud trenches: The Attacker doth persist too much, methinks](https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-the-attacker-doth-persist-too-much/) | 149 | | Darktrace #1 | 2025, July | Compromised credentials | RDP connections to other instances | Data Exfiltration | [Defending the Cloud: Stopping Cyber Threats in Azure and AWS with Darktrace](https://www.darktrace.com/blog/defending-the-cloud-stopping-cyber-threats-in-azure-and-aws-with-darktrace) | 150 | | Darktrace #2 | 2025, July | SonicWall | N/A | Data Exfiltration | [Defending the Cloud: Stopping Cyber Threats in Azure and AWS with Darktrace](https://www.darktrace.com/blog/defending-the-cloud-stopping-cyber-threats-in-azure-and-aws-with-darktrace) | 151 | | Google Cloud Threat Horizons UNC4899 Case | 2025, July | Malware via job opportunity premise | Session cookie theft, CloudFront & S3 JS modification | Cryptocurrency theft | [GCAT Threat Horizons H2 2025](https://services.google.com/fh/files/misc/cloud_threat_horizons_report_h22025.pdf) | 152 | | Wiz | 2025, September | Stolen or compromised credentials | Exit SES sandbox via support | SES abuse for phishing | [From Compromised Keys to Phishing Campaigns: Inside a Cloud Email Service Takeover](https://www.wiz.io/blog/wiz-discovers-cloud-email-abuse-campaign) | 153 | 154 | --- 155 | 156 | [Postmortem Culture: Learning from Failure](https://sre.google/sre-book/postmortem-culture/) 157 | 158 | _Note_: There have been numerous identified incidents of Magecart exploiting S3 Global Write - in [one review targeting "well over 17,000 domains"](https://web.archive.org/web/20210620145033/https://www.riskiq.com/blog/labs/magecart-amazon-s3-buckets/) 159 | --------------------------------------------------------------------------------