Talk With an Expert

Defending Against JavaGhost Preventing Abuse of Your Cloud Environments for Cyber Attacks

Defending Against JavaGhost Preventing Abuse of Your Cloud Environments for Cyber Attacks (PDF, 1.23MB)Last updated: 02 Oct, 2025
Presented by:
Margaret Kelley
Margaret Kelley

Over the last 3 years, Unit 42 has performed multiple investigations relating to the threat actor group "JavaGhost," which targeted organizations’ AWS environments.

This group utilizes stolen access keys to gain entry into the victim environment, establishes advanced persistence and then sets up their own infrastructure to continue their attacks against further victims.

As a result, victims then foot the bill for this infrastructure and causes a reputational and legal headache.

This presentation will cover common methodologies which JavaGhost uses to create their phishing infrastructure in addition to tactics employed within compromised cloud environments to establish long-term persistence.

Lastly, we will discuss a comprehensive approach to detecting and preventing this form of attack from happening to your organization’s AWS environment.

SANS CloudSecNext Summit 2025