• logicbomb@lemmy.world
    link
    fedilink
    English
    arrow-up
    10
    ·
    1 day ago

    It says they use publicly exposed or leaked IAM keys with RW permission to do this, in case anybody is interested in how they get in.