• logicbomb@lemmy.world
    link
    fedilink
    English
    arrow-up
    10
    ·
    2 days ago

    It says they use publicly exposed or leaked IAM keys with RW permission to do this, in case anybody is interested in how they get in.