Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments
Cybercriminals are infiltrating organizations’ cloud storage containers, stealing sensitive data, and sometimes being paid off by the victims to keep the data private. According to Palo Alto Networks, the attackers likely used automation techniques.