AWS Heist Fiasco: Criminals Expose Own Stash in Misconfigured S3 Bucket!
In a colossal irony, cybercriminals looted AWS customer data only to store it in an open S3 bucket, revealing their exploits and showcasing the complexities of the shared responsibility model. AWS customers should remember: never leave your keys in the proverbial car door.

Hot Take:
Well, well, well, it seems like even cyber crooks aren’t immune to the classic mistake of leaving your wallet on the roof of your car. Only in this case, it was a treasure chest of stolen data left wide open in an S3 bucket. The irony is so rich, it should be taxed.
Key Points:
- Cyber crooks exploited misconfigurations in AWS to steal credentials and source code.
- The heist is linked to infamous cybercrime gangs, Nemesis and ShinyHunters.
- The criminals themselves left the stolen data in an unsecured S3 bucket.
- AWS emphasizes the shared responsibility model, placing some blame on customers.
- Researchers uncovered the operation and reported it to authorities in September.
Already a member? Log in here