A new report from Trend Research warns that ransomware operators are rapidly shifting their focus from traditional systems to cloud-native environments, with Amazon S3 emerging as one of the most strategically valuable—and vulnerable—targets for modern threat actors.
In a detailed technical analysis, the researchers outline five S3 ransomware variants, combining both real-world incidents and proof-of-concept attack vectors that could shape future ransomware campaigns in cloud ecosystems.
As Trend Research summarizes, “Ransomware is shifting from traditional systems to cloud environments, redefining its impact on cloud-native data.”
Historically, ransomware relied on malicious binaries deployed through phishing, network intrusions, and vulnerable software. But the cloud has fundamentally changed the playbook. As organizations migrate critical workloads to services like AWS, attackers are pivoting to vulnerabilities unique to cloud architectures—especially misconfigured storage.
The report states, “Cloud storage services like Amazon Simple Storage Service (S3) remain attractive targets due to potential customer misconfigurations on bucket settings and access controls.”
Unlike traditional encryption malware, cloud-focused ransomware variants frequently exploit:
- Leaked IAM credentials
- Overly permissive bucket policies
- Lack of versioning or object lock
- Exposed access keys for S3 APIs
Trend Research explains that attackers increasingly leverage native AWS features—such as S3 APIs or KMS encryption—rather than malware binaries, allowing them to operate quietly and evade endpoint defenses.
S3 underpins critical operations in most AWS environments: backups, logs, media assets, Terraform state files, database dumps, and more. Its ubiquity makes it a high-value target.
As the report notes, “Among all targets in AWS, Amazon S3 stands out as the most widely used and business critical… Given its central role in data storage, S3 is also a high-value target for ransomware actors.”
Trend identifies several indicators attackers look for when selecting buckets to encrypt or destroy:
- No versioning
- No object lock
- No MFA delete
- Writable policies (e.g., s3:PutObject)
- High-value filenames like backup.sql or prod.env
When these conditions align, attackers can achieve something devastating: complete and irreversible lockout of a victim’s data.
Trend Research’s report provides a detailed breakdown of five attack models, ranging from real-world cases to theoretical but feasible approaches.
- Variant 1 — KMS Key Deletion (SSE-KMS)
An attacker creates a world-readable KMS key in their own AWS account, uses it to encrypt S3 objects, then schedules its deletion—leaving victims with a seven-day countdown before permanent data loss. Trend notes: “Once the CMK is deleted, the encrypted data becomes permanently inaccessible.” This variant is possible but less likely due to AWS support’s ability to intervene. - Variant 2 — SSE-C (Customer-Provided Keys)
This is one of the most dangerous real-world scenarios, exemplified by the “Codefinger” attack. AWS never stores SSE-C encryption keys. Trend explains: “AWS uses the key for encryption but does not store it; only the key’s HMAC is logged in CloudTrail, which cannot be used to recover the original key or decrypt the data.” If attackers encrypt S3 data using their own SSE-C key, the victim—and even AWS—cannot recover it. - Variant 3 — Exfiltration + Deletion (Bling Libra Attack)
Used in real-world extortion campaigns, attackers steal S3 data, then delete it from the victim’s environment. Trend notes: “The attacker exfiltrates all data… and deletes all object data from the S3 bucket or deletes the bucket entirely.” With no backups or bucket versioning, the damage is irreversible. - Variant 4 — Imported KMS Key Material (BYOK)
Attackers import their own key material into AWS KMS with a short expiration, use it to encrypt S3 data, then allow it to expire—destroying the encryption key. Trend highlights this as a dangerous future vector: “This variant hasn’t happened in the real world, but it is a potential vector… as the key is not accessible to customers or AWS.” - Variant 5 — External Key Store (XKS) Abuse
A complex technique involving the AWS XKS proxy to encrypt S3 data using keys outside AWS infrastructure—completely beyond AWS’s control. Trend warns: “The key is not accessible to either customers or AWS.” This is another theoretical but feasible vector if attackers gain deep IAM access.
Across all variants, the common denominator is overly permissive IAM policies or leaked credentials that grant attackers the ability to:
- Encrypt data
- Delete snapshots
- Disable versioning
- Upload ransomware notes
- Destroy backups
Trend writes: “Attackers are increasingly exploiting customer misconfigured storage resources and stolen credentials.” Cloud security missteps—not AWS vulnerabilities—are the root cause.
Related Posts:
- LockBit Imposter: New Ransomware Leverages AWS for Attacks
- New Yurei Ransomware Emerges: Go-Based Threat Uses ChaCha20-Poly1305 for Irreversible Double Extortion
- New Yurei Ransomware Emerges: Go-Based Variant Uses Advanced Anti-Forensics for Irreversible Double Extortion
- AWS IAM Roles Anywhere: A Potential Backdoor for Attackers?
- Broadcom & Canonical Join Forces to Supercharge AI and Cloud with Ubuntu