Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Exploiting ECS Protocol on EC2 to Exfiltrate Cross-Task IAM and Execution Role Credentials

Posted on August 8, 2025August 8, 2025 By CWS

A complicated method dubbed “ECScape” that enables malicious containers operating on Amazon Elastic Container Service (ECS) to steal AWS credentials from different containers sharing the identical EC2 occasion.

The invention highlights crucial isolation weaknesses in multi-tenant ECS deployments and underscores the safety benefits of AWS Fargate’s micro-VM structure.

The method, developed by safety researcher Naor Haziz, exploits an undocumented inside protocol between ECS brokers and AWS’s management airplane to exfiltrate IAM credentials throughout container boundaries.

In contrast to conventional container escape strategies requiring host-level entry, ECScape operates completely throughout the container’s namespace whereas leveraging community manipulation to impersonate the ECS agent.

The assault begins when a compromised container accesses the Occasion Metadata Service (IMDS) at 169.254.169.254 to acquire the EC2 occasion’s IAM function credentials. These credentials, usually utilized by the ECS agent for reliable operations, turn into the inspiration for the following impersonation assault.

Utilizing the stolen occasion credentials, attackers can uncover the ECS management airplane’s polling endpoint by the ecs:DiscoverPollEndpoint API and collect important identifiers, together with cluster ARNs and container occasion ARNs.

The malicious course of then establishes a cast WebSocket connection to AWS’s Agent Communication Service (ACS), the inner channel by which ECS delivers job credentials to brokers.

ECScape Assault Abuses ECS Protocol

By together with the parameter sendCredentials=true within the WebSocket handshake, attackers can obtain all IAM credentials for each job operating on the shared EC2 occasion.

This consists of each software function credentials and job execution function credentials, which frequently comprise delicate permissions for accessing AWS Secrets and techniques Supervisor, ECR repositories, and CloudWatch Logs.

ECScape demonstrates significantly regarding stealth traits, as stolen credentials operate identically to reliable ones. AWS CloudTrail logs attribute API calls to the sufferer job’s function relatively than the attacking container, making preliminary detection extraordinarily difficult.

The method breaks basic assumptions about container isolation in ECS environments, permitting low-privileged duties to imagine the permissions of high-privileged containers on the identical host.

In demonstration environments, researchers confirmed how a container with deny-all IAM insurance policies might efficiently delete S3 buckets utilizing stolen credentials from a neighboring job with S3 full entry.

The assault additionally enabled the extraction of delicate secrets and techniques meant for different containers, successfully compromising the multi-tenant safety mannequin.

AWS reviewed the findings by their coordinated disclosure program however categorised the habits as a design consideration relatively than a vulnerability. The corporate emphasised that containers sharing EC2 cases are implicitly a part of the identical belief area until customers implement correct isolation measures.

Following the disclosure, AWS up to date its documentation to explicitly warn that “duties operating on the identical EC2 occasion might doubtlessly entry credentials belonging to different duties on that occasion”. The corporate strongly recommends AWS Fargate for situations requiring stronger isolation ensures.

Safety specialists advocate a number of mitigation methods: disabling or proscribing IMDS entry for containers by community controls or the ECS_AWSVPC_BLOCK_IMDS setting, avoiding co-location of high-privilege and low-privilege duties on shared cases, implementing least-privilege IAM insurance policies for all job roles, and deploying complete CloudTrail monitoring to detect uncommon credential utilization patterns.

Organizations operating ECS on EC2 ought to deal with every occasion as a possible failure area and take into account migrating delicate workloads to Fargate’s remoted micro-VM structure for enhanced safety boundaries.

Equip your SOC with full entry to the newest menace knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Credentials, CrossTask, EC2, ECS, Execution, Exfiltrate, Exploiting, IAM, Protocol, Role

Post navigation

Previous Post: Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen $1 Million from Victims
Next Post: Columbia University Data Breach Impacts 860,000

Related Posts

APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging “mspaint.exe” File Cyber Security News
Mustang Panda Attacking Windows Users With ToneShell Malware Mimic as Google Chrome Cyber Security News
Snake Keyloggers Abuse Java Utilities to Evade Security Tools Cyber Security News
Arkana Ransomware Claimed to Have Stolen 2.2 Million Customer Records Cyber Security News
Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands Cyber Security News
SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment
  • US Confirms Shutdown of BlackSuit Ransomware That Hacked Over 450 Organizations
  • What Attackers Are Doing With Them
  • Black Hat USA 2025 – Summary of Vendor Announcements (Part 4)
  • Columbia University Data Breach – Hackers Stolen 870,000 Individuals Personal and Financial Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment
  • US Confirms Shutdown of BlackSuit Ransomware That Hacked Over 450 Organizations
  • What Attackers Are Doing With Them
  • Black Hat USA 2025 – Summary of Vendor Announcements (Part 4)
  • Columbia University Data Breach – Hackers Stolen 870,000 Individuals Personal and Financial Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News