aws-customer-security-incidents icon indicating copy to clipboard operation
aws-customer-security-incidents copied to clipboard

A repository of breaches of AWS customers

Results 23 aws-customer-security-incidents issues
Sort by recently updated
recently updated
newest added

https://hackerone.com/reports/1624140

disclosure

https://www.sumologic.com/security-response-center/ > On Friday, November 3rd, 2023, Sumo Logic discovered evidence of a potential security incident. The activity identified used a compromised credential to access a Sumo Logic AWS account....

pending-details

https://www.timehop.com/security/technical + https://www.timehop.com/security AWS not mentioned - but likely implicated via OSINT on stack of company

pending-details

https://www.reddit.com/r/announcements/comments/93qnm5/we_had_a_security_incident_heres_what_you_need_to/ https://www.reddit.com/r/announcements/comments/93qnm5/we_had_a_security_incident_heres_what_you_need_to/e3f79r9/ https://oag.ca.gov/system/files/Reddit%20breach%20notice%20%28email%29_0.pdf Known: * we learned that between June 14 and June 18, an attacker compromised a few of our employees’ accounts with our cloud and source code hosting...

pending-details

https://www.mandiant.com/resources/blog/unc3944-sms-phishing-sim-swapping-ransomware > We have observed evidence suggesting that UNC3944 may use various infostealers to support their operations. For example, the threat actors used a PowerShell script to download the ULTRAKNOT...

threat actor

https://securelist.com/backdoored-free-download-manager-linux-malware/110465/ > This stealer collects data such as system information, browsing history, saved passwords, cryptocurrency wallet files, as well as credentials for cloud services (AWS, Google Cloud, Oracle Cloud Infrastructure,...

threat actor

https://coffeemeetsbagel.zendesk.com/hc/en-us/articles/20204630281491-CMB-August-23-Outage-FAQ > We determined that the outage was the result of an outside actor who maliciously deleted company data and files.

pending-details

https://oag.ca.gov/system/files/EpiSource%20Notice%20Letter%20%285.27.23%29.pdf

pending-details

https://www.wired.com/story/sequoia-hr-data-breach/

pending-details

https://www.databreaches.net/ask-fm-user-database-with-350m-user-records-has-shown-up-for-sale/

pending-details