The Codefinger ransomware represents a new frontier in cyber threats, specifically targeting AWS S3 buckets. By exploiting ...
Threat researchers have identified a new “recovery impossible” ransomware campaign targeting Amazon Web Services. Here’s what ...
The Codefinger ransomware encrypts data in Amazon S3 buckets. There are many AWS access points circulating on the darknet that open the door to it.
Attackers access storage buckets with exposed AWS keys The files are then encrypted and scheduled for deletion after a week ...
A new ransomware crew dubbed Codefinger targets AWS S3 buckets and uses the cloud giant's own server-side encryption with customer provided keys (SSE-C) to lock up victims' data before demanding a ...
There’s a new big bad in the ransomware world known as Codefinger. Like the ransomware we’re accustomed to, it encrypts data and demands payment but this particular variant is remixing that ...
The campaign was discovered by Halcyon, who reported that a threat actor named "Codefinger" had encrypted at least two victims. However, the operation could escalate or the tactic could be adopted ...