TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Subdomain hack associated with a removed S3 bucket

14 点作者 holdenc将近 5 年前
tldr; If you delete an S3 bucket with a subdomain name, you need to delete the DNS record that points to it, or the missing bucket may be recreated by someone else, and used to host bad content at your subdomain.<p>Timeline:<p>- Received a message from Google Search Console that a new user has been verified for to-be-hacked.my-company.com.<p>- Looked in Google Search Console, but no new users exist. However, a new site map was submitted for: to-be-hacked.my-company.com&#x2F;sitemap.xml This is filled with spam pages. The hacker apparently recreated the missing S3 bucket in their own account, and used this to verify the domain ownership with Google Search Console and then host the sitemap.xml filled with spam content. The spam content is also hosted in the bucket at to-be-hacked.my-company.com.

2 条评论

gtsteve将近 5 年前
Interesting, thanks. I guess I didn&#x27;t consider it because I&#x27;ve never deleted a S3 bucket. We&#x27;ve got a few S3 buckets used in that way, I&#x27;ll make sure our guys know never to delete them.
评论 #24070186 未加载
k4ch0w将近 5 年前
Very common attack. It&#x27;s called a subdomain takeover.