Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Bapak Exploiting Stolen Cloud Access Keys

Type
Campaign
Actors
šŸ‘ØšŸ»Bapak
Pub. date
January 15, 2025
Initial access
End-user compromise
Impact
Resource hijacking
Observed techniques
Valid creds abuseCredential theft
Targeted technologies
AWS ECS
References
https://www.wiz.io/blog/detecting-behavioral-cloud-indicators-of-compromise-iocs
Status
Finalized
Last edited
Feb 6, 2025 9:54 AM

Wiz Threat Research discovered a malicious campaign where attackers are using leaked or stolen cloud access keys to access cloud environments and deploy ECS clusters. The attacker was observed abusing accidentally exposed AWS access keys and trying to gain a permanent foothold in their victims' cloud environments, attempting to create additional users and importing their own SSH keys. In some cases they also tried to deploy multiple ECS clusters, which could have been used for a plethora of malicious activities, such as crypto-mining or network vulnerability scanning.

These attackers appear to be targeting leaked AWS API keys, commonly exposed through client-side scripts, overly accessibleĀ .envĀ files, or uploads to public code repositories. After obtaining such keys, the attacker typically initiates a series of API calls, often starting with calls to test the key's validity, such asĀ GetCallerIdentity. In most cases, we observed the attackers attempting to create an ECS cluster using theĀ CreateClusterĀ API, likely for purposes such as crypto-mining or other malicious activities. These newly created clusters were consistently named eitherĀ bapak1Ā orĀ entot1, which are Indonesian words, further suggesting the group’s possible origin in Indonesia.

Made with šŸ’™ by Wiz

Last Updated: April 3, 2025