Subdomain hack associated with a removed S3 bucket
14 points| holdenc | 5 years ago
Timeline:
- Received a message from Google Search Console that a new user has been verified for to-be-hacked.my-company.com.
- Looked in Google Search Console, but no new users exist. However, a new site map was submitted for: to-be-hacked.my-company.com/sitemap.xml This is filled with spam pages. The hacker apparently recreated the missing S3 bucket in their own account, and used this to verify the domain ownership with Google Search Console and then host the sitemap.xml filled with spam content. The spam content is also hosted in the bucket at to-be-hacked.my-company.com.
gtsteve|5 years ago
holdenc|5 years ago
k4ch0w|5 years ago