• logicbomb@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    ·
    21 hours ago

    It says they use publicly exposed or leaked IAM keys with RW permission to do this, in case anybody is interested in how they get in.