ShinyHunters, Nemesis Linked to Hacks After Leaking Their AWS S3 Bucket
hackread.com- Large-Scale Hacking Operation Uncovered: Researchers link ShinyHunters and Nemesis to an operation exploiting millions of websites to steal over 2 terabytes of sensitive data.
- Sophisticated Tools and Tactics: Hackers used Python, PHP, AWS IP ranges, and tools like ffuf, httpx, and Shodan to automate and expand their exploitation across regions.
- Collaborative Mitigation Efforts: Researchers worked with the AWS Fraud Team to notify affected users, implement mitigation measures, and identify individuals involved in selling stolen data on Telegram.
- Critical Discovery in Misconfigured S3 Bucket: An open S3 bucket used by the hackers exposed their stolen data, tools, and even potential identities, offering a unique glimpse into their operations.
- Call for Stronger Cybersecurity Practices: The incident shows the need for proper configurations to protect cloud environments and prevent such large-scale breaches.
Cybersecurity researchers have identified a large-scale hacking operation linked to notorious ShinyHunters and Nemesis hacking groups. In this operation, hackers exploited ...
Copyright of this story solely belongs to hackread.com . To see the full text click HERE