Attackers re-register abandoned AWS S3 buckets filled with malicious files that are executed by applications looking for these buckets.