Article Details
Scrape Timestamp (UTC): 2023-10-25 12:20:52.616
Source: https://thehackernews.com/2023/10/the-rise-of-s3-ransomware-how-to.html
Original Article Text
Click to Toggle View
The Rise of S3 Ransomware: How to Identify and Combat It. In today's digital landscape, around 60% of corporate data now resides in the cloud, with Amazon S3 standing as the backbone of data storage for many major corporations. Despite S3 being a secure service from a reputable provider, its pivotal role in handling vast amounts of sensitive data (customer personal information, financial data, intellectual property, etc.), provides a juicy target for threat actors. It remains susceptible to ransomware attacks which are often initiated using leaked access keys that have accidentally been exposed by human error and have access to the organization's buckets. To effectively combat these evolving threats, it is vital to ensure that your organization has visibility into your S3 environment, that you are aware of how threat actors can compromise data for ransom and most importantly, best practices for minimizing the risk of cyber criminals successfully executing such an attack. Ensuring Visibility: CloudTrail and Server Access Logs Visibility serves as the foundation for any effective detection strategy. In Amazon S3, nearly every action translates to an API call, which are meticulously recorded in CloudTrail and documented in AWS documentation. The two primary options for logging activity in S3 buckets — CloudTrail Data Events and Server Access Logs — hold a wealth of information that security practitioners must leverage to anticipate and detect suspicious activity. Each offer distinct advantages and trade-offs: Mitigating Risk by Understanding the Attack Scenarios Utilizing the above logs to ensure adequate visibility, it is possible to keep an eye out for potential attack scenarios in order to mitigate risks effectively. There are three main attack scenarios that we observe with S3 ransomware attacks, all which can prevent an organization from accessing its data. Below are the attack scenarios, along with links to hunting queries that the expert threat hunting team from Hunters' Team Axon has shared publicly that allow anyone to search for these attack scenarios within their own environments: *Note: Object Encryption and Object Deletion - Delete Operations require enabling Cloudtrail Data Events for the appropriate buckets. Each scenario poses significant disruptions, potentially preventing organizations from accessing critical data. By delving into the required permissions, attacker perspectives, and detection methods for each scenario, organizations can proactively prepare for potential threats. Protection and Best Practices Understanding the attack scenarios helps to provide context for how to implement proactive measures to significantly reduce the attack surface. There are several things that can be done to enhance the security of S3 buckets from the threat of ransomware. Conclusion As data volumes continue to surge, securing Amazon S3 is paramount in safeguarding millions of organizations against ransomware attacks and evolving cyber threats. Prioritizing threats, ensuring visibility through CloudTrail and Server Access Logs, and implementing proactive measures are essential steps in mitigating risk. By adopting these strategies, organizations can fortify their S3 buckets' protection and ensure the integrity and security of their critical data. For a more in depth breakdown of common attack scenarios and best practices, check out a video deep dive from Team Axon. Team Axon is the expert threat hunting arm of the popular SIEM replacement Hunters, and offers rapid response to emerging cyber threats, on-demand cyber expertise and proactive threat hunting across customers' environments. Follow Team Axon on X for timely updates on emerging cyber threats and premiere cyber content. Additional S3 Resources:
Daily Brief Summary
Around 60% of corporate data is now stored in the cloud, with Amazon S3 serving as a major data storage platform.
Amazon S3, despite being a secure and reputable platform, is vulnerable to ransomware attacks as it holds vast amounts of sensitive data.
The ransomware attacks are often initiated using leaked access keys, which offer threat actors access to the organization's data.
Organizations can leverage Amazon S3’s existing logging solutions for activity – CloudTrail Data Events and Server Access Logs – as a part of their detection strategy for suspicious activity.
It is crucial for organizations to comprehend the possible attack scenarios to effectively mitigate risks.
Implementing proactive measures, ensuring visibility of data through efficient use of logs, and prioritizing threats are some of the steps organizations can take to mitigate risk and safeguard their S3 data against ransomware attacks.
Team Axon, the expert threat hunting team from Hunters provides deep dive video into common attack scenarios and best practices to protect against ransomware attacks.