"For example, when threat actors successfully identify and compromise AWS credentials from a vulnerable website, they have been observed attempting to create new users and user policies," the Feds warn.
"Threat actors are further able to set up a fake (illegitimate) page accessible via the URI to provide backdoor access to the website," the authorities note.
[
add
]
[
|
|
...
]