Hackers Using AWS Tools To Exploit Compromised Credentials

Security researchers have observed consistent activity from a threat actor dubbed “EC2 Grouper,” which is responsible for numerous cloud compromises and exhibits a distinct modus operandi.  EC2 Grouper consistently employs specific user agents and adheres to a unique security group naming convention across their operations, which allows security teams to identify and potentially mitigate their […]

The post Hackers Using AWS Tools To Exploit Compromised Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

This article has been indexed from GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Read the original article: