We found malicious samples attempting to steal Amazon Elastic Compute Cloud (EC2) Workloads’ access keys and tokens via typosquatting and the abuse of legitimate tools.
This article has been indexed from Trend Micro Research, News and Perspectives
Read the original article: