Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI-Powered Hackers Breach AWS in Under 10 Minutes

AI-Powered Hackers Breach AWS in Under 10 Minutes

Posted on February 4, 2026 By CWS

AI Accelerates Cloud Attack Timelines

In a groundbreaking incident in November 2025, cybercriminals harnessed artificial intelligence to drastically reduce the time required for cloud attacks. The Sysdig Threat Research Team (TRT) revealed that these threat actors achieved AWS administrative access in under 10 minutes, showcasing the rapid evolution and sophistication of AI-facilitated cyber threats.

The attackers leveraged large language models (LLMs) to perform automated reconnaissance, generate harmful code, and make real-time attack decisions. Their target was an Amazon Web Services (AWS) environment, marking a significant shift in how quickly and efficiently cyber threats can emerge in cloud settings.

Exploiting AWS Credentials

The breach commenced when attackers discovered legitimate AWS credentials in publicly available Simple Storage Service (S3) buckets containing Retrieval-Augmented Generation (RAG) data for AI models. These credentials belonged to an Identity and Access Management (IAM) user with permissions on AWS Lambda and limited access to Amazon Bedrock.

Using a ReadOnlyAccess policy, the attackers conducted extensive reconnaissance across various AWS services, including Secrets Manager, EC2, and CloudWatch. They then manipulated permissions on Lambda to insert malicious code into an existing function, ultimately gaining admin access by creating new access keys.

Advanced Tactics and AI Utilization

Throughout the operation, the attackers demonstrated advanced techniques, likely assisted by AI tools. The code injection into Lambda was marked by comprehensive exception handling and comments in Serbian, hinting at the attackers’ possible origins. Attempts to assume roles in fabricated AWS accounts and references to non-existent repositories further illustrated AI’s role in this attack.

In addition to compromising multiple AWS principals, the attackers created a backdoor user, enabling persistent access. They disabled model invocation logging and initiated ‘LLMjacking’ operations, invoking several AI models within Amazon Bedrock.

Resource Exploitation and Defense Measures

Expanding their exploitation, the attackers provisioned expensive EC2 instances to run deep learning applications, circumventing AWS credentials by installing a JupyterLab server. They used an IP rotation tool to evade detection, showcasing a sophisticated level of evasion tactics.

To mitigate such threats, organizations are urged to enforce the principle of least privilege for IAM users, restrict critical permissions, ensure secure bucket configurations, and enhance logging and monitoring. As AI tools become more advanced, these types of attacks may increase, necessitating robust runtime detection and security measures.

Stay informed on cybersecurity trends by following us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:AI security, AI tools, AWS breach, AWS Lambda, cloud attacks, cloud security, credential theft, cyber threats, cybersecurity measures, IAM roles

Post navigation

Previous Post: TRM Labs Secures $70M for AI in Blockchain Security
Next Post: China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia

Related Posts

Researchers Exploited Google kernelCTF Instances And Debian 12 With A 0-Day Researchers Exploited Google kernelCTF Instances And Debian 12 With A 0-Day Cyber Security News
Interpol Taken Down 6 Ransomware Variants and Arrested 500+ Suspects Interpol Taken Down 6 Ransomware Variants and Arrested 500+ Suspects Cyber Security News
CISA Warns of Fortinet FortiWeb OS Command Injection Vulnerability Exploited in the Wild CISA Warns of Fortinet FortiWeb OS Command Injection Vulnerability Exploited in the Wild Cyber Security News
New APT28 Attack Via Signal Messenger Delivers BeardShell and Covenant Malware New APT28 Attack Via Signal Messenger Delivers BeardShell and Covenant Malware Cyber Security News
Earth Ammit Hackers Attacking Using New Tools to Attack Drones Used in Military Sectors Earth Ammit Hackers Attacking Using New Tools to Attack Drones Used in Military Sectors Cyber Security News
Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • MomentProof Introduces AI-Resilient Asset Protection for AXA
  • Orion Secures $32M to Enhance Data Security Solutions
  • Notepad++ Update System Breach Targets Global Users
  • Cyberwarfare Threats in 2026: Nation-State vs. Criminal Activities
  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • MomentProof Introduces AI-Resilient Asset Protection for AXA
  • Orion Secures $32M to Enhance Data Security Solutions
  • Notepad++ Update System Breach Targets Global Users
  • Cyberwarfare Threats in 2026: Nation-State vs. Criminal Activities
  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark