Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

‘Codefinger’ crims on the hunt for compromised keys

A new ransomware crew dubbed Codefinger targets AWS S3 buckets and uses the cloud giant’s own server-side encryption with customer provided keys (SSE-C) to lock up victims’ data before demanding a ransom payment for the symmetric AES-256 keys required to decrypt it.…

This article has been indexed from The Register – Security

Read the original article: