Security researchers have observed consistent activity from a threat actor dubbed “EC2 Grouper,” which is responsible for numerous cloud compromises and exhibits a distinct modus operandi. EC2 Grouper consistently employs specific user agents and adheres to a unique security group naming convention across their operations, which allows security teams to identify and potentially mitigate their […]
The post Hackers Using AWS Tools To Exploit Compromised Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
This article has been indexed from GBHackers Security | #1 Globally Trusted Cyber Security News Platform