In this episode of Breaking Badness, we dive into two major cybersecurity concerns: the risks of abandoned S3 buckets and a wave of phishing attacks impersonating DeepSeek. watchTowr Labs uncovers how forgotten AWS storage can be hijacked for malicious purposes, potentially compromising military, government, and enterprise systems. Meanwhile, attackers exploit DeepSeek’s rising popularity to create lookalike sites, tricking unsuspecting users into downloading malware or exposing credentials.
Join hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce as they break down these findings with humor, deep insights, and even a few pop culture references. Plus, we rate the severity of these threats on our infamous Hoodie Scale and wrap up with Gold, Guidance & Grievances.
One of the biggest takeaways from this episode was the eye-opening research from watchTowr Labs on S3 bucket takeovers. These misconfigurations and abandoned cloud storage instances pose a significant cybersecurity risk, and as Taylor Wilkes-Pierce explained:
“They were getting requests from .mil networks, .gov networks… That is concerning. Problematic.”
What Happened?
What Can Be Done?
Read watchTowr Labs' full report here
As AI models like DeepSeek dominate headlines, cybercriminals are riding the hype wave to create convincing phishing sites. These fake DeepSeek websites trick users into:
How Are Attackers Doing It?
“It’s not that they’re trying to impersonate DeepSeek’s functionality itself… but they’re capitalizing on the hype.”
How to Stay Safe?
See Memcyco’s DeepSeek phishing analysis
That’s about all we have for this week, you can find us on Mastodon and Twitter/X @domaintools, all of the articles mentioned in our podcast will always be included on our podcast recap. Catch us Wednesdays at 9 AM Pacific time when we publish our next podcast and blog.
*A special thanks to John Roderick for our incredible podcast music!