Abandoned AWS Cloud Storage: A Major Cyber-Attack VectorAbandoned AWS Cloud Storage: A Major Cyber-Attack Vector
New research highlights how bad actors could abuse deleted AWS S3 buckets to create all sorts of mayhem, including a SolarWinds-style supply chain attack.
Abandoned cloud storage buckets present a major, but largely overlooked, threat to Internet security, new research has shown.
The risks arise when bad actors discover and re-register these neglected digital repositories under their original name and then use them to deliver malware or carry out other malicious actions against anyone still requesting files from them.
A Far From Theoretical Threat
The threat is far from theoretical, and the weakness is, in fact, incredibly easy to exploit, researchers from watchTowr discovered recently. The findings came as a follow-up to previous research they conducted last year on risks tied to expired and abandoned internet domain names.
For the latest study, the researchers first searched the Internet for Amazon AWS S3 buckets referenced in deployment code or a software update mechanism. They then checked to see if those mechanisms were pulling down unsigned or unverified executables or code from the S3 buckets.
The researchers discovered some 150 S3 buckets that at some time a government organization, Fortune 500 company, technology company, cybersecurity vendor, or major open source project had used for software deployment, updates, configurations, and similar purposes, and then abandoned.
Keep reading this article in Dark Reading, a Data Center Knowledge partner site
Read more about:
Dark ReadingAbout the Authors
You May Also Like