- Malicious actor encrypts files:
An attacker uses compromised credentials to access an S3 bucket, encrypting files and leaving a ransom note demanding payment in cryptocurrency.
- Over-permissioned application misbehaves:
A misconfigured script with excessive permissions accidentally overwrites critical files during a bulk operation, mimicking ransomware behavior.