Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Drone Strikes Disrupt AWS Services in UAE Region

Drone Strikes Disrupt AWS Services in UAE Region

Posted on March 5, 2026 By CWS

AWS Cloud Services in the Middle East Disrupted

On March 1, 2026, Amazon Web Services (AWS) experienced a significant outage in its Middle East operations due to drone strikes targeting its data centers in the United Arab Emirates (UAE) and Bahrain. This incident, which began in the early morning hours, affected over 109 services within the ME-CENTRAL-1 region, leaving many enterprise customers working to recover their operations over several days.

At approximately 4:30 AM PST, an AWS Availability Zone in the UAE, known as mec1-az2, was hit, initially causing sparks and fires within the facility. Local authorities responded by cutting power to the site to manage the situation, but AWS initially described the event as a “localized power issue.”

Extent of the Damage Unveiled

By the following day, AWS confirmed that two data centers in the UAE and another in Bahrain were struck by drones, attributing the attacks to ongoing regional conflicts. These strikes resulted in significant structural damage, power disruptions, and triggered fire suppression systems, leading to further complications.

Additional problems arose when another zone, mec1-az3, went offline hours after the initial strike, leaving only mec1-az1 partially functional. The redundancy systems in place, like those for Amazon S3, struggled under these conditions, leading to high error rates in data transactions.

Impacts on AWS Services and Regional Businesses

The outage affected a wide array of AWS services, including Amazon S3, DynamoDB, EC2, and more, with varying levels of disruption. The impact was severe enough to cascade through AWS’s service stack, causing significant operational challenges for businesses reliant on these services.

Local businesses such as Careem, Alaan, and Hubpay experienced disruptions, emphasizing the critical role AWS plays in the regional digital infrastructure. AWS initiated recovery efforts, focusing on both physical repairs and software solutions to restore service availability.

Recovery Efforts and Industry Implications

By March 3, AWS had made progress in restoring some services, notably in Amazon S3 operations, although full recovery remained dependent on infrastructure repairs. AWS advised customers to activate disaster recovery plans, utilize remote backups, and redirect application traffic to alternative regions, such as those in the US, Europe, and Asia Pacific.

This incident has sparked renewed discussions about the resilience of cloud infrastructures in conflict zones and the risks associated with geographic concentration. Enterprises operating in volatile regions are now urged to consider multi-region active-active architectures to mitigate such risks in the future.

For more updates on cybersecurity and cloud infrastructure, follow us on Google News, LinkedIn, and X.

Cyber Security News Tags:Amazon S3, AWS, AWS services, cloud infrastructure, cloud outage, cloud resilience, Cybersecurity, data centers, disaster recovery, drone strikes, enterprise IT, geopolitical risks, Middle East conflict, UAE

Post navigation

Previous Post: Cisco Alerts on Exploitation of SD-WAN Vulnerabilities
Next Post: Cyber Threats: Key Updates on Malware, Privacy, and Security

Related Posts

New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories Cyber Security News
New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182) New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182) Cyber Security News
Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection Cyber Security News
IRGC-Linked APT35 Structure, Tools, and Espionage Operations Disclosed IRGC-Linked APT35 Structure, Tools, and Espionage Operations Disclosed Cyber Security News
SURXRAT Android Malware Threatens Global Device Security SURXRAT Android Malware Threatens Global Device Security Cyber Security News
BlackLock Ransomware Attacking Windows, Linux, and VMware ESXi Environments BlackLock Ransomware Attacking Windows, Linux, and VMware ESXi Environments Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RedAlert Espionage Campaign Exploits Trojanized App
  • Preparing for Quantum Security: A Crucial Webinar
  • Reclaim Security Secures $26M for Cybersecurity Innovation
  • Half of 2025’s Zero-Day Exploits Target Businesses: Google
  • Cyber Threats: Key Updates on Malware, Privacy, and Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RedAlert Espionage Campaign Exploits Trojanized App
  • Preparing for Quantum Security: A Crucial Webinar
  • Reclaim Security Secures $26M for Cybersecurity Innovation
  • Half of 2025’s Zero-Day Exploits Target Businesses: Google
  • Cyber Threats: Key Updates on Malware, Privacy, and Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News