Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

EMERALDWHALE Attacks Targeting Exposed Git Config Files

Type
Campaign
Actors
EMERALDWHALE
Pub. date
October 30, 2024
Initial access
Exposed secret
Impact
Data exfiltration
Observed techniques
Exposed git config files abuse
Observed tools
MIZARUPeer2Profitgit-dumper
Targeted technologies
Laravel
References
https://sysdig.com/blog/emeraldwhale/
Status
Finalized
Last edited
Nov 3, 2024 1:36 PM

Research uncovered an operation named EMERALDWHALE that compromised over 15,000 cloud service credentials by exploiting exposed Git configurations and other misconfigured web services. The attack aimed to steal credentials from private Git repositories and cloud environments, storing them in a publicly accessible S3 bucket from a previous victim. EMERALDWHALE targeted credentials for major cloud service providers, email providers, and various other services, aiming primarily to facilitate phishing and spam campaigns.

EMERALDWHALE leveraged multiple custom tools, including "MZR V2 (MIZARU)" and "Seyzo-v2," to identify and exploit exposed Git configurations. The attack initiated with large-scale scans of IP address ranges, looking specifically for publicly accessible .git/config files, which store sensitive configuration details. Attackers then extracted, validated, and stored credentials in a compromised S3 bucket. Tools like httpx and git-dumper facilitated high-volume scanning and data extraction, allowing attackers to quickly identify and exploit misconfigured servers. Additionally, the operation targeted exposed Laravel .env files, another common source of sensitive information, including API keys and cloud credentials.

The researchers honeypot observed unusual S3 access calls, revealing over a terabyte of compromised data. The attack employed regex scripts to search for recognizable credential patterns, like AWS keys, within extracted repository files. This approach allowed EMERALDWHALE to collect a wide range of credentials, usable for creating accounts, sending spam, or conducting further reconnaissance. Attackers exploited both Git configuration files and Laravel .env files, combining web scraping techniques with targeted scans of exposed servers to identify valuable credentials across public-facing resources.

Made with 💙 by Wiz

Last Updated: April 3, 2025