Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Crimson Collective Hits AWS Instances

October 10, 2025
Reading Time: 4 mins read
in Incidents
Microsoft 365 Outage Hits Services

A threat group known as Crimson Collective has been actively targeting Amazon Web Services (AWS) cloud environments to steal data and extort companies. Their attacks involve a sophisticated series of steps, as detailed by researchers at Rapid7. The group’s recent claim of responsibility for a major data theft from Red Hat highlights the severity of their operations. According to Crimson Collective, they exfiltrated 570 GB of data from thousands of private GitLab repositories and partnered with Scattered Lapsus$ Hunters to increase pressure on Red Hat for a ransom payment. This incident underscores the group’s aggressive extortion tactics and the significant risks they pose to organizations using AWS.

Crimson Collective’s attack methodology begins by compromising long-term AWS access keys and identity and access management (IAM) accounts. They use the open-source tool TruffleHog to find exposed AWS credentials, then gain access and create new IAM users and login profiles via API calls. Once inside, they escalate their privileges by attaching the ‘AdministratorAccess’ policy to these new users. This gives them full control over the AWS environment. They then use this high-level access to enumerate a wide range of assets, including users, instances, buckets, and database clusters, to plan their data exfiltration strategy.

The group’s data theft process is systematic and thorough. For databases, they modify the Relational Database Service (RDS) master passwords to gain access, create snapshots, and then export them to Simple Storage Service (S3) buckets using API calls for exfiltration. They also create snapshots of Elastic Block Store (EBS) volumes and launch new Elastic Compute Cloud (EC2) instances. These EBS volumes are then attached to permissive security groups to facilitate data transfer, ensuring they can move the stolen information out of the compromised environment with ease.

After exfiltrating the data, Crimson Collective moves on to the extortion phase. They send a ransom note to their victims via the AWS Simple Email Service (SES) from within the breached cloud environment, as well as to external email addresses. Researchers note that the group uses multiple IP addresses in their operations but has also reused some across different incidents, which could aid in tracking. In response to these threats, AWS advises customers to use short-term, least-privileged credentials and implement restrictive IAM policies to reduce their exposure.

While the exact size and composition of the Crimson Collective threat group remain unknown, their activities and extortion tactics should not be overlooked. Their methods differ from other threat actors, such as “Codefinger,” who was known for encrypting S3 buckets rather than exfiltrating data. To mitigate these attacks, it’s recommended that organizations scan their environments for unknown exposures using open-source tools like the S3crets Scanner. Staying vigilant and implementing strong security practices are crucial steps in preventing catastrophic breaches from leaked AWS secrets.

Reference:

  • Crimson Collective Hackers Target AWS Cloud Instances To Steal Sensitive Data
Tags: cyber incidentsCyber Incidents 2025Cyber threatsOctober 2025
ADVERTISEMENT

Related Posts

Belgian Telecoms Hit By Cyberattack

Hackers Steal Data From Swiss Bank

November 6, 2025
Belgian Telecoms Hit By Cyberattack

Belgian Telecoms Hit By Cyberattack

November 6, 2025
Belgian Telecoms Hit By Cyberattack

Sandworm Wipers Hit Ukraines Grain Hub

November 6, 2025

Hackers Target UK Water Suppliers

November 5, 2025

Nikkei Data Breach Hits 17000

November 5, 2025
Microsoft Edge Adds Scareware Sensor

Apache OpenOffice Denies Breach

November 5, 2025

Latest Alerts

Russia Group Exploits Windows HyperV

SkyCloak Backdoor Targets Defense Firms

Teams Bugs Let Hackers Impersonate

Post SMTP Plugin Hijacks Admins

React Native CLI Flaw Exposed

Smudged Serpent Targets US Experts

Subscribe to our newsletter

    Latest Incidents

    Hackers Steal Data From Swiss Bank

    Belgian Telecoms Hit By Cyberattack

    Sandworm Wipers Hit Ukraines Grain Hub

    Hackers Target UK Water Suppliers

    Nikkei Data Breach Hits 17000

    Apache OpenOffice Denies Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial