logicbomb@lemmy.worldtoTechnology@lemmy.world•Ransomware crew abuses AWS native encryptionEnglish
10·
3 days agoIt says they use publicly exposed or leaked IAM keys with RW permission to do this, in case anybody is interested in how they get in.
It says they use publicly exposed or leaked IAM keys with RW permission to do this, in case anybody is interested in how they get in.
I’m guessing you’re basing it off of this official legal correspondence, which I am including below for people who haven’t seen it: