back to article Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

A new ransomware crew dubbed Codefinger targets AWS S3 buckets and uses the cloud giant's own server-side encryption with customer provided keys (SSE-C) to lock up victims' data before demanding a ransom payment for the symmetric AES-256 keys required to decrypt it. Halcyon threat hunters say they first spotted this criminal …

  1. Anonymous Coward
    Anonymous Coward

    Ignorant Old F**t Here....

    Quote: "...customer provided keys (SSE-C)..."

    Quote: "...AWS's native secure encryption infrastructure.."

    Hah...."keys", "secure".......Really?

    Once upon a time (1976) two guys (Diffie and Hellman) invented a scheme where THERE WAS NO NEED to share or publish ACTUAL KEYS.

    The basic idea was that two people would share D/H tokens....and then the secret key(s) would be CALCULATED when needed....and then the secret key(s) would always be DESTROYED.

    So.....transient keys (i.e. VERY transient!)...nothing published or "managed".

    Yup....1976!

    What is this old f**t missing in 2025?

    1. Anonymous Coward
      Anonymous Coward

      Re: Ignorant Old F**t Here....

      Yup....looking at the book "Cryptography Engineering" (Ferguson, Schneier, Kohno, 2010) they say this about Diffie/Hellman: "Implementing the D/H protocol can be a bit tricky".

      There follows eight pages of advice about implementation.

      Does Amazon (Jeff Bezos) have a few dollars (and fifteen years) to get the "key problem" fixed???? Obviously not!

      (Sorry....1976 to 2025 is nearly fifty years....but the time from the quoted book is only (!) fifteen years.)

    2. Sandtitz Silver badge
      Pint

      Re: Ignorant Old F**t Here....

      What is this old f**t missing in 2025?

      Well, read the article again.

      Once the attackers get access to the victim's Amazon infrastructure, they encrypt the data at rest using Amazon encryption APIs.

      Something, something, old man yells at cloud, something.

      1. Claptrap314 Silver badge
        Pint

        Re: Ignorant Old F**t Here....

        Have another for "old man yells at cloud"... ---------------------------------------------------------------------------->

  2. Crypto Monad Silver badge

    Immutable buckets

    i.e. versioning + object lock, configured with a fixed minimum retention, say 3 months. Then if anyone deletes or overwrites your object, you have 3 months to retrieve the previous version.

    Mind you: if an attacker has somehow gained the ability to re-encrypt files in your bucket, then they could instead do it a million times and bankrupt you in AWS storage fees.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like