Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Researchers Uncover Security Risks in Abandoned AWS S3 Buckets
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Researchers Uncover Security Risks in Abandoned AWS S3 Buckets

Highlights

  • Abandoned AWS S3 buckets pose significant security threats.

  • Various global organizations interacted with these neglected assets.

  • Proactive cloud management is essential to prevent exploitation.

Samantha Reed
Last updated: 4 February, 2025 - 2:09 pm 2:09 pm
Samantha Reed 3 months ago
Share
SHARE

Abandoned digital resources on Amazon Web Services pose significant security threats, according to new research by WatchTowr. Cybersecurity experts monitored neglected S3 buckets once used by various organizations, revealing vulnerabilities that could facilitate large-scale supply chain attacks. The study underscores the persistent dangers inherent in forgotten cloud infrastructure.

Contents
How were the abandoned S3 buckets exploited?What types of organizations were affected?What measures can prevent such security risks?

Similar to previous incidents like the SolarWinds breach, the current findings highlight how overlooked cloud assets can be exploited by malicious actors to compromise sensitive networks and distribute malware.

How were the abandoned S3 buckets exploited?

WatchTowr researchers gained control of approximately 150 neglected Amazon S3 assets and observed them receiving over 8 million HTTP requests. These requests included attempts to access software updates, unsigned binaries for various operating systems, virtual machine images, and server configurations. Such activity indicates potential avenues for attackers to distribute malware or gain unauthorized access to critical systems.

What types of organizations were affected?

A wide range of entities interacted with the abandoned S3 buckets, including government networks from countries like the United States, United Kingdom, and South Korea, as well as Fortune 500 companies, financial institutions, universities, and cybersecurity firms. This broad spectrum of affected organizations demonstrates the widespread reliance on cloud infrastructure and the critical need for proper maintenance and security practices.

What measures can prevent such security risks?

To mitigate these risks, organizations must implement robust cloud management protocols, including regular audits of digital assets, timely decommissioning of unused resources, and stringent access controls. Additionally, collaboration with cloud service providers to monitor and secure abandoned infrastructure is essential in preventing unauthorized exploitation.

“We believe that in the wrong hands, the research we have performed could have led to supply chain attacks that out-scaled and out-impacted anything we as an industry have seen so far — or put more clearly, we’d have embarrassed Cozy Bear and made their SolarWinds adventures look amateurish and insignificant,”

reads WatchTowr’s blog. Another statement from the company emphasizes,

“We will not entertain any conversation or speculation that we targeted any organization,”

highlighting that the intent was to reveal systemic vulnerabilities rather than target specific entities.

The investigation by WatchTowr reveals systemic issues in cloud infrastructure management, particularly the abandonment of digital resources that remain vulnerable over extended periods. Ensuring the security of cloud assets requires a proactive approach to monitoring and maintenance, addressing not just technical configurations but also the organizational practices that lead to neglect.

Effective cloud security strategies should include automated tools for detecting and retiring unused resources, comprehensive logging of access attempts, and regular security assessments to identify and remediate potential vulnerabilities. By adopting these measures, organizations can significantly reduce the risk of their neglected infrastructure being exploited for malicious purposes.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Today’s Wordle Reveals Hints and Winning Strategies
Next Article Google Pixel Watch May Feature New Adaptive Charging Technology

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

UR15 Boosts Automation Speed in Key Industries
Robotics
NHTSA Questions Tesla’s Robotaxi Plans in Austin
Electric Vehicle
Tesla’s Secretive Test Car Activities Ignite Curiosity
Electric Vehicle
AI Reshapes Global Workforce Dynamics
AI Technology
Nvidia Faces Price Uncertainty Despite Tariff Agreement
Computing
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?