Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud EnvironmentsWe recount an extensive cloud extortion campaign leveraging exposed .env files of at least 110k domains to compromise organizations' AWS environments.#unit42#EN#2024#Leaked#Environment#Variables#cloud#aws#extortion·unit42.paloaltonetworks.com·Aug 15, 2024Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments
MERCURY and DEV-1084: Destructive attack on hybrid environment - Microsoft Security BlogMicrosoft detected a unique operation where threat actors carried out destructive actions in both on-premises and cloud environments.#microsoft#EN#2023#MERCURY#DEV-1084#analysis#cloud#hybrid#environment#Iran#TTPs#operation·microsoft.com·Apr 10, 2023MERCURY and DEV-1084: Destructive attack on hybrid environment - Microsoft Security Blog
MERCURY and DEV-1084: Destructive attack on hybrid environment - Microsoft Security BlogMicrosoft detected a unique operation where threat actors carried out destructive actions in both on-premises and cloud environments.#microsoft#EN#2023#MERCURY#DEV-1084#analysis#cloud#hybrid#environment#Iran#TTPs#operation·microsoft.com·Apr 10, 2023MERCURY and DEV-1084: Destructive attack on hybrid environment - Microsoft Security Blog