10 votes

8 million requests later, we made the SolarWinds supply chain attack look amateur

1 comment

  1. mattsayar
    Link
    There's a whole lot of "now draw the rest of the owl" here. I was hoping they'd explain how they found all these abandoned S3 buckets. Perhaps crawling the targeted sites, pinging regexed S3 URLs,...

    Over the course of two months, our technology ingested a huge amount of data to identify references to abandoned S3 buckets and subsequently alerted us if any were found.

    There's a whole lot of "now draw the rest of the owl" here. I was hoping they'd explain how they found all these abandoned S3 buckets. Perhaps crawling the targeted sites, pinging regexed S3 URLs, and saving the ones that returned 404s?

    5 votes