Bling Libra's Tactical Evolution: The Threat Actor Group Behind ShinyHunters Ransomware
Summary: Tool Analysis Suggested Corrections:
Unit 42’s recent investigation uncovered a shift in strategy by the Bling Libra group, which is known for its ShinyHunters ransomware. Instead of just selling stolen data as they have in the past, they’ve now turned to extorting their victims. This new approach involves using legitimate credentials they found in public repositories to break into and compromise Amazon Web Services (AWS) environments.
Even though the stolen credentials had limited access, Bling Libra was able to get into the AWS environment, carry out some reconnaissance, and use tools like Amazon S3 Browser and WinSCP to examine S3 bucket settings, access data, and delete it. By analyzing the logs from these tools, we can better understand which activities were performed by the attackers and which were just automated actions from the tools themselves.
Security Officer Comments:
As more businesses move to the cloud, the threat posed by groups like Bling Libra highlights the urgent need for robust cybersecurity practices. Using AWS’s security tools, such as Amazon GuardDuty, AWS Config, and AWS Service Control Policies, is essential for protecting cloud resources.
Incident Details
To secure AWS environments and mitigate risks, organizations should adopt the principle of least privilege by ensuring that IAM users and roles have only the permissions necessary for their tasks, while regularly reviewing and adjusting permissions.
Link(s):
https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/