Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Codefinger Ransomware Campaign Targeting S3 Buckets

Type
Campaign
Actors
Codefinger
Pub. date
January 13, 2025
Initial access
Exposed secret
Impact
RansomOp
Observed techniques
Bucket / storage ransomware
Targeted technologies
S3 Bucket
References
https://www.halcyon.ai/blog/abusing-aws-native-services-ransomware-encrypting-s3-buckets-with-sse-c
Status
Finalized
Last edited
Feb 6, 2025 9:56 AM

Researchers discovered a ransomware campaign leveraging AWS Server-Side Encryption with Customer Provided Keys (SSE-C) to encrypt data in Amazon S3 buckets. The attack, orchestrated by the threat actor "Codefinger," uses compromised AWS credentials to encrypt files securely. Victims are forced to pay ransoms to obtain the AES-256 keys needed for decryption. This method does not exploit AWS vulnerabilities but abuses legitimate features.

The campaign begins with the threat actor acquiring disclosed or stolen AWS keys with permissions to execute S3 operations. Using SSE-C, the attacker generates AES-256 encryption keys, which are stored locally while AWS infrastructure processes the encryption. Critically, AWS retains only an HMAC of the key, making data recovery impossible without the attacker’s cooperation. To pressure victims into paying the ransom, files are marked for deletion within seven days using S3 lifecycle policies, and ransom notes are placed in affected directories, detailing payment instructions and warnings against modifying permissions.

Made with 💙 by Wiz

Last Updated: April 3, 2025