Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI-Powered Hackers Breach AWS in Under 10 Minutes

AI-Powered Hackers Breach AWS in Under 10 Minutes

Posted on February 4, 2026 By CWS

AI Accelerates Cloud Attack Timelines

In a groundbreaking incident in November 2025, cybercriminals harnessed artificial intelligence to drastically reduce the time required for cloud attacks. The Sysdig Threat Research Team (TRT) revealed that these threat actors achieved AWS administrative access in under 10 minutes, showcasing the rapid evolution and sophistication of AI-facilitated cyber threats.

The attackers leveraged large language models (LLMs) to perform automated reconnaissance, generate harmful code, and make real-time attack decisions. Their target was an Amazon Web Services (AWS) environment, marking a significant shift in how quickly and efficiently cyber threats can emerge in cloud settings.

Exploiting AWS Credentials

The breach commenced when attackers discovered legitimate AWS credentials in publicly available Simple Storage Service (S3) buckets containing Retrieval-Augmented Generation (RAG) data for AI models. These credentials belonged to an Identity and Access Management (IAM) user with permissions on AWS Lambda and limited access to Amazon Bedrock.

Using a ReadOnlyAccess policy, the attackers conducted extensive reconnaissance across various AWS services, including Secrets Manager, EC2, and CloudWatch. They then manipulated permissions on Lambda to insert malicious code into an existing function, ultimately gaining admin access by creating new access keys.

Advanced Tactics and AI Utilization

Throughout the operation, the attackers demonstrated advanced techniques, likely assisted by AI tools. The code injection into Lambda was marked by comprehensive exception handling and comments in Serbian, hinting at the attackers’ possible origins. Attempts to assume roles in fabricated AWS accounts and references to non-existent repositories further illustrated AI’s role in this attack.

In addition to compromising multiple AWS principals, the attackers created a backdoor user, enabling persistent access. They disabled model invocation logging and initiated ‘LLMjacking’ operations, invoking several AI models within Amazon Bedrock.

Resource Exploitation and Defense Measures

Expanding their exploitation, the attackers provisioned expensive EC2 instances to run deep learning applications, circumventing AWS credentials by installing a JupyterLab server. They used an IP rotation tool to evade detection, showcasing a sophisticated level of evasion tactics.

To mitigate such threats, organizations are urged to enforce the principle of least privilege for IAM users, restrict critical permissions, ensure secure bucket configurations, and enhance logging and monitoring. As AI tools become more advanced, these types of attacks may increase, necessitating robust runtime detection and security measures.

Stay informed on cybersecurity trends by following us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:AI security, AI tools, AWS breach, AWS Lambda, cloud attacks, cloud security, credential theft, cyber threats, cybersecurity measures, IAM roles

Post navigation

Previous Post: TRM Labs Secures $70M for AI in Blockchain Security
Next Post: China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia

Related Posts

Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications Cyber Security News
5 Malicious Chrome Extensions Attacking Enterprise HR and ERP Platforms for Complete Takeover 5 Malicious Chrome Extensions Attacking Enterprise HR and ERP Platforms for Complete Takeover Cyber Security News
North Korean Hackers Weaponizing NPM Packages to Steal Cryptocurrency and Sensitive Data North Korean Hackers Weaponizing NPM Packages to Steal Cryptocurrency and Sensitive Data Cyber Security News
Threat Actors Targeting Ukraine’s Defense Forces With Charity-Themed Malware Campaign Threat Actors Targeting Ukraine’s Defense Forces With Charity-Themed Malware Campaign Cyber Security News
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances Cyber Security News
Threat Actors Allegedly Listed Windows Zero-Day RCE Exploit For Sale on Dark Web Threat Actors Allegedly Listed Windows Zero-Day RCE Exploit For Sale on Dark Web Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Notepad++ Update System Breach Targets Global Users
  • Cyberwarfare Threats in 2026: Nation-State vs. Criminal Activities
  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia
  • AI-Powered Hackers Breach AWS in Under 10 Minutes
  • TRM Labs Secures $70M for AI in Blockchain Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Notepad++ Update System Breach Targets Global Users
  • Cyberwarfare Threats in 2026: Nation-State vs. Criminal Activities
  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia
  • AI-Powered Hackers Breach AWS in Under 10 Minutes
  • TRM Labs Secures $70M for AI in Blockchain Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark