• geekworking@lemmy.world
    link
    fedilink
    English
    arrow-up
    131
    arrow-down
    1
    ·
    8 months ago

    accounts of a subsidiary of one of the world’s largest e-commerce entities.

    How to say AWS without saying AWS.

      • hpca01@programming.dev
        link
        fedilink
        English
        arrow-up
        58
        ·
        8 months ago

        It’s not fun, I got hacked through an archived git repo, for when I was learning to use AWS, following tutorials and whatnot.

        Forgot about it for years, then out of nowhere got hit for 27k…needless to say I said good luck collecting that shit.

        They waived it all granted I logged in and deleted all resources that were running as well as removed all identities. Sure as hell I did that and saw a ton of identities out in the middle of nowhere. Fucking hackers ran up a shit ton of AWS sagemaker resources trying to probably hack some dude’s wallet.

        Every time I see a tutorial on how to deploy x in AWS, I get pissed. The newbies need to learn about administration before they start deploying shit on cloud infra.

  • Poutinetown@lemmy.ca
    link
    fedilink
    English
    arrow-up
    29
    arrow-down
    2
    ·
    8 months ago

    By using the computing resources of others’ servers to mine cryptocurrency, the cybercriminals can profit at the expense of the compromised organizations, whose CPU and GPU performance is degraded by the mining.

    Oh boy, where do I start…

    • BearOfaTime@lemm.ee
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      6
      ·
      8 months ago

      Right?

      I have so little sympathy for people who get owned today…

      And I say this as someone who’s always dragging my own feet to follow new security protocols and concepts, change passwords often, etc.

      But on the professional side… I do everything, and don’t let anything slide, even something seemingly minor. It’s those cracks that get exploited.

      So dot your “T’s” and cross your “I’s”, because that’s how you ensure this stuff doesn’t happen. Layers, layers and layers of security and oversight.