Researchers from Palo Alto Networks’ Unit 42 uncovered a large-scale cyber attack targeting cloud environments by exploiting secrets in .env files. The attack involved five phases: Initial Access, Account Discovery, Privilege Escalation, Malicious Execution, and Data Exfiltration. The attackers gained access to AWS environments, escalated privileges, executed malicious code, and exfiltrated data from S3 buckets, leaving ransom notes. Understanding the structure of AWS IAM roles and implementing security best practices are critical to mitigate such threats.

10m read timeFrom infosecwriteups.com
Post cover image
Table of contents
3.1. Structure of an AWS IAM Role — Trust and Permission Policies3.2. Escalating Privileges using CreateRole and AttachRolePolicy

Sort: