What’s the worst place to leave your secrets? – Research into what happens to AWS credentials that are left in public places

TL;DR I deployed canary tokens in various public places on the Internet, logged all access attempts, and discovered intriguing patterns on credential discovery and attack methodologies of threat actors. Canary Tokens Primer Canary tokens are a type of digital tripwire designed to detect unauthorized access or activity within a system. They work by embedding seemingly … Continue reading What’s the worst place to leave your secrets? – Research into what happens to AWS credentials that are left in public places