Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Elektra-Leak and ServiceNow: Alarm Bells for Critical Data Leaks
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Elektra-Leak and ServiceNow: Alarm Bells for Critical Data Leaks

Highlights

  • A concerning revelation has emerged with EleKtra-Leak’s campaign focusing on exposed Amazon Web Service (AWS) IAM credentials in public GitHub repositories. The objective? Facilitating cryptojacking operations. This operation has been active since at least December 2020, with evidence pointing towards the mining of Monero using Amazon EC2 instances from August to October 2023. ContentsRelated Cybersecurity […]
Bilgesu Erdem
Last updated: 30 October, 2023 - 3:47 pm 3:47 pm
Bilgesu Erdem 2 years ago
Share
SHARE

A concerning revelation has emerged with EleKtra-Leak’s campaign focusing on exposed Amazon Web Service (AWS) IAM credentials in public GitHub repositories. The objective? Facilitating cryptojacking operations. This operation has been active since at least December 2020, with evidence pointing towards the mining of Monero using Amazon EC2 instances from August to October 2023.

Contents
Related Cybersecurity Concerns: Past Patterns EmergesServiceNow’s Misstep: Potential Data ExposureHarnessing Tools for a Secure Tomorrow

A significant point of concern is the swift automated targeting. Within four minutes of an AWS IAM credential’s exposure on GitHub, threat actors can clone and scan repositories, capturing exposed keys. The rapid nature of this threat further reinforces its potential danger.

Interestingly, the attacker has shown efforts to blocklist AWS accounts that disclose IAM credentials, possibly to thwart any deeper scrutiny.

Related Cybersecurity Concerns: Past Patterns Emerges

Certain indications link this attacker to a previous cryptojacking campaign, targeting Docker services. This campaign took advantage of vulnerabilities in GitHub’s secret scanning and AWS’ policies. Even though AWS has a policy that flags compromised credentials within minutes of public access on GitHub, the method of exposure remains undetermined.

In some scenarios, stolen AWS credentials were utilized to conduct account recon, set up AWS security groups, and initiate multiple EC2 instances from behind VPNs. Additionally, crypto-mining operations utilized the c5a.24xlarge AWS instances for their increased computational capabilities.

Organizations are being urged to take proactive measures. If AWS IAM credentials are exposed, it is crucial to disconnect API links using those keys, erase them from GitHub, and review repository cloning actions for unusual activities.

ServiceNow’s Misstep: Potential Data Exposure

ServiceNow, a widely recognized cloud-based platform for IT and business management, recently alerted users about potential “unintended access” due to misconfigurations. The implications? Possible significant data leakage of confidential company data.

The core of the issue lies within an interface widget named Simple List, which gathers data stored in tables for dashboards. The problem has been lingering since 2015, and without resolution, could have made companies more susceptible than ever to data exposure.

However, it’s imperative to understand that the problem was not rooted in a ServiceNow flaw, but rather a configuration within the platform. Tackling this was not a straightforward task as altering one setting could disrupt existing processes.

ServiceNow has proposed a series of remediation steps, emphasizing reviewing Access Control Lists, adjusting public widgets, employing stricter access controls, and even suggesting the installation of the ServiceNow Explicit Roles Plugin for enhanced security.

Harnessing Tools for a Secure Tomorrow

For organizations employing ServiceNow and similar platforms, SaaS Security Posture Management (SSPM) solutions, such as Adaptive Shield, can offer an extra layer of protection. They provide insight into application configurations and alert security teams about high-risk configurations, allowing timely adjustments to prevent data leaks.

Two major cybersecurity issues have come to light. While the threats and their implications are distinct, they underscore the pressing need for vigilance, the right tools, and informed actions in today’s digital landscape. As technologies evolve, so do threats, and the responsibility lies with organizations to safeguard their assets.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

CIOs Tackle Quantum Threat in Encryption Race

FTC Seeks New Tools to Combat Deepfake Pornography

Cyberattacks Exploit Major Software Vulnerabilities, Affecting Global Infrastructure

North Korea Builds Cyber Network Resembling a Mafia Operation

Cybercriminals Invest Illicit Profits in Surprising Ventures

Share This Article
Facebook Twitter Copy Link Print
By Bilgesu Erdem
Bilgesu graduated from Ankara University, Faculty of Communication, Department of Radio, Television and Cinema. After working as a reporter for various television channels and a newspaper, Bilgesu is currently working as a content editor at Newslinker. She loves technology and animals.
Previous Article Samsung Celebrates Two Decades with the Galaxy Z Flip5 Retro Release
Next Article Apple Introduces MacBook Pro Series with M3 Chip: What’s In Store?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Conquer Wordle Challenges with Expert Tips Today
Gaming
Ekso Bionics Joins NVIDIA for Advanced AI in Exoskeleton Tech
Robotics
Master Wordle Strategy with these Unbeatable Tips
Gaming
RealMan Robotics Unveils Innovative Automation at Automate 2025
Robotics
Nvidia RTX 5060 Surprises with Performance and Price
Computing
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?