Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Hacker Tools Used for Good as Exposed Amazon Cloud Storage Accounts Get Warnings
  • Data Breach
  • Vulnerabilities

Hacker Tools Used for Good as Exposed Amazon Cloud Storage Accounts Get Warnings

5 years ago Ben Layer
Hacker Tools Used for Good as Exposed Amazon Cloud Storage Accounts Get Warnings

Responding to the all too familiar news of compromised Amazon cloud storage, security researchers have begun leaving “friendly warnings” on AWS S3 accounts with exposed data or incorrect permissions.

The misconfiguration of access control on AWS storage “buckets” has been behind numerous high profile data breaches, including Verizon, The Pentagon, Uber and FedEx.

Researchers have begun taking security notification into their own hands, with security advice left behind on publicly accessible storage.

These warning messages come in multiple forms from multiple sources, pointing to a plethora of interested parties performing these white hat notifications.

The messages range from the simple “Please fix this before a bad guy finds it” to more complex warnings about the consequences of exposed cloud storage:

Use of Amazon S3 for cloud storage has exploded in recent years as more and more organizations migrate to the cloud. The ease of purchase and use lends itself to quick projects that can often be left unmonitored after project completion.

This, combined with the complex nature of S3 access control, has led to many unused buckets being left forgotten and exposed.

Tools such as BuckHacker and AWSBucketDump make it easy for attackers to scan the AWS S3 storage service for publicly exposed data, and now those same tools are being used by security researchers in a defensive capacity.

By first using these tools to find exposed cloud storage accounts, defenders then upload files containing messages of warning and advice on security.

It is vital that you perform a check-up of your cloud security posture, doubly so if you see warnings or other suspicious behavior in your cloud accounts.

Tripwire has multiple tools to help secure your cloud infrastructure, from cloud storage monitoring to vulnerability management and breach detection in your cloud computing resources.

Tripwire Configuration Manager can be used to automatically assess your AWS S3 buckets to determine if they are exposed to anonymous access and even perform automatic remediation and enforcement on buckets that have become newly exposed as might happen with accidental changes to access permissions. 

Since you can’t possibly know everything and be everywhere (any more than you already do), let Tripwire® Configuration Manager automate your cloud security. Test drive it with your own cloud accounts or use our sample data to see what simplified cloud monitoring looks like in action.

Learn more here: https://www.tripwire.com/products/tripwire-configuration-manager/worry-less-about-cloud-security

The post ” Hacker Tools Used for Good as Exposed Amazon Cloud Storage Accounts Get Warnings” appeared first on TripWire

Source:TripWire – Ben Layer

Tags: Cloud, Encryption, Hacker, High Severity, TripWire

Continue Reading

Previous Cybersecurity Training: Raising Awareness And Securing Your Business
Next 70 European and South American Banks Under Attack By Bizarro Banking Malware

More Stories

  • Data Breach
  • Vulnerabilities

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

18 hours ago [email protected] (The Hacker News)
  • Data Breach
  • Malware

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack

3 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Vulnerabilities

Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug

3 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Vulnerabilities

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

3 days ago [email protected] (The Hacker News)
  • Vulnerabilities

TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

3 days ago [email protected] (The Hacker News)

Recent Posts

  • Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
  • OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability
  • DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials
  • ⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More
  • 3 SOC Process Fixes That Unlock Tier 1 Productivity

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT