Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server

Posted on October 6, 2025October 6, 2025 By CWS

A classy method uncovered the place menace actors abuse Amazon Net Providers‘ X-Ray distributed tracing service to determine covert command and management (C2) communications, demonstrating how official cloud infrastructure may be weaponized for malicious functions.

AWS X-Ray, designed to assist builders analyze utility efficiency by way of distributed tracing, has been repurposed by crimson crew researchers right into a steganographic communication channel referred to as XRayC2. 

This method leverages X-Ray’s annotation system, which permits arbitrary key-value information storage, to transmit instructions and exfiltrate information by way of official AWS API calls to xray.[region].amazonaws.com endpoints.

Weaponizing AWS X-Ray for Covert Command and Management

In response to Dhiraj, the assault methodology exploits X-Ray’s hint segments performance, the place malicious payloads are embedded inside seemingly benign monitoring information. 

Attackers make the most of the service’s PutTraceSegments, GetTraceSummaries, and BatchGetTraces API endpoints to determine bidirectional communication channels that mix seamlessly with official cloud visitors.

The implant establishes presence by way of beacon markers containing system info encoded in hint annotations, together with service kind identifiers like “health_check” and distinctive occasion identifiers. 

Command Supply (Controller → Implant)

Command supply happens by way of base64-encoded payloads saved in configuration annotations, whereas end result exfiltration leverages execution_result fields inside hint information buildings.

This method demonstrates refined evasion capabilities by implementing customized AWS Signature Model 4 (SigV4) authentication, creating official AWS API visitors that integrates naturally with normal community logs. 

The malicious communication employs randomized beacon intervals between 30 and 60 seconds and makes use of HMAC-SHA256 signing with entry keys, following Amazon’s canonical request format.

Consequence Exfiltration (Implant → Controller)

The XRayC2 toolkit requires minimal AWS permissions, using the AWSXRayDaemonWriteAccess coverage alongside customized permissions for hint manipulation. 

This method considerably reduces the assault floor in comparison with conventional C2 infrastructure whereas sustaining persistent entry by way of cloud-native companies.

Detection of this system presents challenges for safety groups, because the malicious visitors seems as normal utility efficiency monitoring actions. 

Organizations ought to implement enhanced monitoring of X-Ray API utilization patterns, set up baseline metrics for hint annotation information volumes, and scrutinize uncommon service interactions inside their AWS environments to establish potential abuse of official cloud companies for covert communications.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AWS, Command, Control, Covert, Hackers, Server, Service, Weaponize, Work, XRay

Post navigation

Previous Post: QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code
Next Post: Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks

Related Posts

Timeliner – Windows Forensic Tool for DFIR Investigators Cyber Security News
Open VSX Registry Addresses Leaked Tokens and Malicious Extensions in Wake of Security Scare Cyber Security News
Chinese National Jailed for Laundering Over £5 Billion by Defrauding Over 128,000 Victims Cyber Security News
U.S. Secret Service Dismantles 300 SIM Servers and 100,000 SIM Cards Cyber Security News
Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested Cyber Security News
Crypto Developers Attacked With Malicious npm Packages to Steal Login Details Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark