Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server

Posted on October 6, 2025October 6, 2025 By CWS

A classy method uncovered the place menace actors abuse Amazon Net Providers‘ X-Ray distributed tracing service to determine covert command and management (C2) communications, demonstrating how official cloud infrastructure may be weaponized for malicious functions.

AWS X-Ray, designed to assist builders analyze utility efficiency by way of distributed tracing, has been repurposed by crimson crew researchers right into a steganographic communication channel referred to as XRayC2. 

This method leverages X-Ray’s annotation system, which permits arbitrary key-value information storage, to transmit instructions and exfiltrate information by way of official AWS API calls to xray.[region].amazonaws.com endpoints.

Weaponizing AWS X-Ray for Covert Command and Management

In response to Dhiraj, the assault methodology exploits X-Ray’s hint segments performance, the place malicious payloads are embedded inside seemingly benign monitoring information. 

Attackers make the most of the service’s PutTraceSegments, GetTraceSummaries, and BatchGetTraces API endpoints to determine bidirectional communication channels that mix seamlessly with official cloud visitors.

The implant establishes presence by way of beacon markers containing system info encoded in hint annotations, together with service kind identifiers like “health_check” and distinctive occasion identifiers. 

Command Supply (Controller → Implant)

Command supply happens by way of base64-encoded payloads saved in configuration annotations, whereas end result exfiltration leverages execution_result fields inside hint information buildings.

This method demonstrates refined evasion capabilities by implementing customized AWS Signature Model 4 (SigV4) authentication, creating official AWS API visitors that integrates naturally with normal community logs. 

The malicious communication employs randomized beacon intervals between 30 and 60 seconds and makes use of HMAC-SHA256 signing with entry keys, following Amazon’s canonical request format.

Consequence Exfiltration (Implant → Controller)

The XRayC2 toolkit requires minimal AWS permissions, using the AWSXRayDaemonWriteAccess coverage alongside customized permissions for hint manipulation. 

This method considerably reduces the assault floor in comparison with conventional C2 infrastructure whereas sustaining persistent entry by way of cloud-native companies.

Detection of this system presents challenges for safety groups, because the malicious visitors seems as normal utility efficiency monitoring actions. 

Organizations ought to implement enhanced monitoring of X-Ray API utilization patterns, set up baseline metrics for hint annotation information volumes, and scrutinize uncommon service interactions inside their AWS environments to establish potential abuse of official cloud companies for covert communications.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AWS, Command, Control, Covert, Hackers, Server, Service, Weaponize, Work, XRay

Post navigation

Previous Post: QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code
Next Post: Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks

Related Posts

Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code Cyber Security News
Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes Cyber Security News
Cybercrime-as-a-Service – Countering Accessible Hacking Tools Cyber Security News
CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits Cyber Security News
Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data Cyber Security News
Adobe’s August 2025 Patch Tuesday Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News