Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI-Powered Hackers Breach AWS in Under 10 Minutes

AI-Powered Hackers Breach AWS in Under 10 Minutes

Posted on February 4, 2026 By CWS

AI Accelerates Cloud Attack Timelines

In a groundbreaking incident in November 2025, cybercriminals harnessed artificial intelligence to drastically reduce the time required for cloud attacks. The Sysdig Threat Research Team (TRT) revealed that these threat actors achieved AWS administrative access in under 10 minutes, showcasing the rapid evolution and sophistication of AI-facilitated cyber threats.

The attackers leveraged large language models (LLMs) to perform automated reconnaissance, generate harmful code, and make real-time attack decisions. Their target was an Amazon Web Services (AWS) environment, marking a significant shift in how quickly and efficiently cyber threats can emerge in cloud settings.

Exploiting AWS Credentials

The breach commenced when attackers discovered legitimate AWS credentials in publicly available Simple Storage Service (S3) buckets containing Retrieval-Augmented Generation (RAG) data for AI models. These credentials belonged to an Identity and Access Management (IAM) user with permissions on AWS Lambda and limited access to Amazon Bedrock.

Using a ReadOnlyAccess policy, the attackers conducted extensive reconnaissance across various AWS services, including Secrets Manager, EC2, and CloudWatch. They then manipulated permissions on Lambda to insert malicious code into an existing function, ultimately gaining admin access by creating new access keys.

Advanced Tactics and AI Utilization

Throughout the operation, the attackers demonstrated advanced techniques, likely assisted by AI tools. The code injection into Lambda was marked by comprehensive exception handling and comments in Serbian, hinting at the attackers’ possible origins. Attempts to assume roles in fabricated AWS accounts and references to non-existent repositories further illustrated AI’s role in this attack.

In addition to compromising multiple AWS principals, the attackers created a backdoor user, enabling persistent access. They disabled model invocation logging and initiated ‘LLMjacking’ operations, invoking several AI models within Amazon Bedrock.

Resource Exploitation and Defense Measures

Expanding their exploitation, the attackers provisioned expensive EC2 instances to run deep learning applications, circumventing AWS credentials by installing a JupyterLab server. They used an IP rotation tool to evade detection, showcasing a sophisticated level of evasion tactics.

To mitigate such threats, organizations are urged to enforce the principle of least privilege for IAM users, restrict critical permissions, ensure secure bucket configurations, and enhance logging and monitoring. As AI tools become more advanced, these types of attacks may increase, necessitating robust runtime detection and security measures.

Stay informed on cybersecurity trends by following us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:AI security, AI tools, AWS breach, AWS Lambda, cloud attacks, cloud security, credential theft, cyber threats, cybersecurity measures, IAM roles

Post navigation

Previous Post: TRM Labs Secures $70M for AI in Blockchain Security
Next Post: China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia

Related Posts

5 Deception Solutions that are Changing the Cybersecurity Game  5 Deception Solutions that are Changing the Cybersecurity Game  Cyber Security News
New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials Cyber Security News
Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data Cyber Security News
Global SIM Farm Network Reveals 87 Control Panels Global SIM Farm Network Reveals 87 Control Panels Cyber Security News
Hackers Utilize Free Firebase for Phishing Schemes Hackers Utilize Free Firebase for Phishing Schemes Cyber Security News
RoningLoader Malware Exploits Advanced Evasion Tactics RoningLoader Malware Exploits Advanced Evasion Tactics Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark