logicbomb@lemmy.worldtoTechnology@lemmy.world•Ransomware crew abuses AWS native encryptionEnglish
6·
8 days agoIt says they use publicly exposed or leaked IAM keys with RW permission to do this, in case anybody is interested in how they get in.
It says they use publicly exposed or leaked IAM keys with RW permission to do this, in case anybody is interested in how they get in.
I don’t know too much about HV, but I thought that even the crazy path shown in the picture was still the path of least resistance. Is that wrong?
That guy Newton didn’t even know that inertial frames of reference weren’t absolute.
I’m guessing you’re basing it off of this official legal correspondence, which I am including below for people who haven’t seen it: