Sysdig’s Threat Research Team (TRT) has unveiled a significant global cyber operation known as EMERALDWHALE, which has successfully stolen over 15,000 cloud service credentials by exploiting exposed Git configuration files. This operation highlights serious security vulnerabilities in cloud infrastructure and source code management practices.
Overview of EMERALDWHALE
The EMERALDWHALE operation targeted misconfigured web services, leading to the compromise of credentials from more than 10,000 private repositories. While the main targets appeared to be cloud service providers and email accounts, the ultimate objective of the attackers was likely to facilitate phishing and spam campaigns. The compromised credentials are believed to be worth hundreds of dollars each, and attackers could further profit by selling targeted lists in underground marketplaces.
Discovery of the Operation
The operation was detected when Sysdig TRT monitored a cloud honeypot and identified unusual activity involving a ListBuckets API call made using a compromised account. This investigation pointed to a publicly accessible S3 bucket named s3simplisitter, which contained over a terabyte of data, including compromised credentials and logs. This evidence pointed to a multi-faceted attack strategy that involved web scraping and data mining from exposed files.
Exploitation Techniques
From August to September, EMERALDWHALE conducted extensive scans to locate servers with exposed Git configuration files. The operation took advantage of misconfigurations that allowed access to sensitive repository data. Git, being a version control system, relies on configuration files that, if exposed, can lead to significant data breaches. Attackers exploited these misconfigurations to extract and monetize leaked information.
Tools Used in the Operation
The operation employed specific tools, commonly available in underground markets, to facilitate their attacks:
- MZR V2 (MIZARU):
- A combination of Python and shell scripts designed to scan IPs for misconfigured
.git/config
files. - Once potential credentials were validated, the tool could clone both public and private repositories to search for sensitive data.
- A combination of Python and shell scripts designed to scan IPs for misconfigured
- Seyzo-v2:
- This tool follows a similar methodology to MZR V2 but conducts more thorough searches specifically targeting credentials from SMTP, SMS, and cloud service providers.
Motivations Behind EMERALDWHALE
The motivation for these types of cyberattacks aligns with the increasing trend of credential harvesting, which is perceived as a profitable and low-risk operation for cybercriminals. With readily available tools and automated processes, attackers can significantly minimize their exposure and risk of detection.
The Broader Implications
The emergence of EMERALDWHALE underscores a critical challenge in the digital security landscape. Credential leaks remain a significant concern exacerbated by poor security configurations and an over-reliance on default settings. This operation reveals that even unsophisticated attacks can yield substantial gains when exploiting existing vulnerabilities.
Recommendations for Mitigation
To combat such threats, organizations should prioritize:
- Comprehensive Exposure Management: Regularly audit and assess configurations, especially for sensitive repositories.
- Vulnerability Scanning: Conduct internal and external scans to identify and remediate security gaps.
- Layered Security Strategies: While secret management is essential, it should be part of a broader security framework to protect against credential leaks and unauthorized access.
The EMERALDWHALE operation serves as a stark reminder that security in today’s environment must be proactive and multifaceted, addressing the root causes of vulnerabilities rather than relying solely on secret management.