Threat Thursday LIVE: S3 Rclone

In this Threat Thursday, we will explore how adversaries use a renamed rclone executable to exfiltrate files to an Amazon S3 bucket, a common tactic in ransomware campaigns before encryption. While many threat actors attempt to sync stolen data with Mega, corporate firewalls and security tools like ZScaler often block these connections. As a result, adversaries turn to S3, which is more likely to bypass host-based firewall restrictions and remain accessible in most environments. Throughout our demonstration, we will simulate this exfiltration technique using synthetically generated sensitive data, mirroring real-world threat actor behavior. The process involves downloading staged data, copying it to a designated directory, and then exfiltrating it to an S3 bucket—just as a real attacker might. This exercise highlights the ease with which data can be exfiltrated and underscores the importance of robust detection strategies to identify and mitigate such threats. 🎙️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! 😍 https://streamyard.com/pal/d/5426359667392512

Already registered?