By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: How to Defend Amazon S3 Buckets From Ransomware Exploiting SSE-C Encryption
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > How to Defend Amazon S3 Buckets From Ransomware Exploiting SSE-C Encryption
News

How to Defend Amazon S3 Buckets From Ransomware Exploiting SSE-C Encryption

News Room
Last updated: 2025/02/23 at 4:29 AM
News Room Published 23 February 2025
Share
SHARE

A new ransomware campaign, dubbed Codefinger, has been targeting Amazon S3 users by exploiting compromised AWS credentials to encrypt data using Server-Side Encryption with Customer-Provided Keys (SSE-C). Attackers then demand ransom payments for the symmetric AES-256 keys required to decrypt the data. AWS has released recommendations to help users mitigate the risk of ransomware attacks on S3.

All key management for S3 server-side encryption with SSE-C is handled outside of AWS, with encryption key material provided alongside the object, ensuring the cloud provider never stores the key material. Following Halcyon’s report, AWS published an article clarifying how to prevent the unintended encryption of Amazon S3 objects. Steve de Vera, manager in the AWS Customer Incident Response Team, and Jennifer Paz, security engineer at AWS, explain:

Working with customers, our security teams detected an increase of data encryption events in S3 that used an encryption method known as SSE-C. While this is a feature used by many customers, we detected a pattern where a large number of S3 CopyObject operations using SSE-C began to overwrite objects, which has the effect of re-encrypting customer data with a new encryption key. Our analysis uncovered that this was being done by malicious actors who had obtained valid customer credentials, and were using them to re-encrypt objects.

Using publicly disclosed or compromised AWS keys, the threat actor identifies keys with permissions to execute s3:GetObject and s3:PutObject requests. The attacker can then initiate the encryption process by including the x-amz-server-side-encryption-customer-algorithm header, using an AES-256 encryption key that they generate and store locally. An S3 lifecycle rule is then applied to mark files for deletion within seven days, adding urgency to the ransom demand. The Halcyon RISE team explains why this poses a significant challenge:

Unlike traditional ransomware that encrypts files locally or in transit, this attack integrates directly with AWS’s secure encryption infrastructure. Once encrypted, recovery is impossible without the attacker’s key.

While these actions do not exploit a vulnerability in any AWS service, Reddit user Zenin highlights in a popular thread:

The biggest threat here is really that the heavy lifting of encrypting the data can be offloaded to S3 and far less likely to raise concerns while it processes. Most traditional ransomware attacks cause a lot of side effects as they run.

Furthermore, AWS CloudTrail logs only the HMAC of the encryption key, which is insufficient for recovery and forensic analysis. Corey Quinn, chief cloud economist at The Duckbill Group, comments:

“Encrypt Everything–no wait not like that” says AWS, in the wake of S3 objects being encrypted using native S3 functionality via ransomware. That’s frankly an ingenious attack vector. Evil. But ingenious.

AWS emphasizes the importance of using short-term credentials, implementing data recovery procedures, and preventing the use of SSE-C on S3 buckets when not necessary for the workload. Additionally, enabling detailed logging for S3 operations is a best practice for detecting unusual activity, such as bulk encryption or lifecycle policy changes. Paz and de Vera write:

If your applications don’t use SSE-C as an encryption method, you can block the use of SSE-C with a resource policy applied to an S3 bucket, or by a resource control policy (RCP) applied to an organization in AWS Organizations.

If a ransomware attack on S3 is suspected, both Halcyon and AWS recommend immediately restricting SSE-C usage, auditing AWS keys, enabling advanced logging, and promptly engaging AWS support as mitigation measures.

 

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Trump Can't Shut Down the Department of Education, but Student Loan Borrowers Should Beware
Next Article Here’s what Phone 17 Pro Max will probably look like – 9to5Mac
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The New Avengers originally had a different post-credits scene, and we need to see it
News
Wine 10.8 Released With Performance Improvement
Computing
Circle to Search now uses your entire screen automatically
News
Check Out Rumoured Specifications, Display, Battery, Pricing and More
Mobile

You Might also Like

News

The New Avengers originally had a different post-credits scene, and we need to see it

9 Min Read
News

Circle to Search now uses your entire screen automatically

2 Min Read
News

OpenAI’s planned data center in Abu Dhabi would be bigger than Monaco | News

3 Min Read
News

Beloved retailer to exit low price era as price hikes confirmed

6 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?