Gang gobbles 15K credentials from cloud and email providers’ garbage Git configs

Gang gobbles 15K credentials from cloud and email providers' garbage Git configs

October 31, 2024 at 08:04PM

Security researchers uncovered a criminal operation named Emeraldwhale, which exposed over 15,000 cloud service and email credentials in an unsecured AWS S3 bucket. The attackers used sophisticated tools to exploit misconfigured servers, targeting Git directories. Although linked to French-speaking malware, Emeraldwhale’s affiliation with a specific criminal group remains unclear.

### Meeting Takeaways

1. **Discovery of Criminal Operation**: A criminal operation named Emeraldwhale was uncovered, having dumped over 15,000 credentials from cloud service and email providers into an unsecured AWS S3 bucket.

2. **Method of Attack**: The attackers conducted a large-scale scanning campaign targeting servers with improperly configured Git and Laravel files using various private tools to exploit misconfigured web services.

3. **Impact of Stolen Credentials**: The stolen credentials granted access to over 10,000 private repositories. These repositories contain sensitive information, including commit history, usernames, email addresses, and API keys, making exposed Git directories highly valuable.

4. **Financial Motivation**: The stolen credentials are highly lucrative, potentially selling for up to $700 per account, with spam and phishing campaigns being the end goals for the criminals.

5. **Accidental Discovery**: The security team from Sysdig stumbled upon over a terabyte of compromised data while monitoring their honeypot network, revealing that the S3 bucket belonged to a previous victim and not Sysdig itself.

6. **Association with Established Groups**: Although no direct connection to known crime syndicates has been established, the complexity of the operation suggests a link to organized crime, possibly with ties to French-speaking individuals due to the language used in some malware tools.

7. **Malware Tools Identified**: Two main malware tools involved are MZR V2 and Seyzo-v2. MZR V2 is capable of validating GitHub credentials, analyzing URLs, and facilitating spam/phishing attacks. Seyzo-v2 is focused on identifying and stealing various email provider credentials.

8. **Target Lists**: Attackers have been using lists containing targeted IP addresses, which aid in exposing Git repositories. One such list, revealing over 67,000 URLs, is reportedly being sold for $100 on underground platforms like Telegram.

9. **Action Taken**: Following the discovery of the exposed S3 bucket, AWS was notified, and they took measures to shut it down.

### Next Steps
– Monitor for additional threats related to Emeraldwhale or similar tactics.
– Ensure all sensitive repositories are secured against similar vulnerabilities.
– Consider investigating the sale of exposed credential lists in underground marketplaces.

Full Article