Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploit AWS IAM Eventual Consistency for Persistence

Posted on December 8, 2025December 8, 2025 By CWS

A essential persistence method in AWS Id and Entry Administration (IAM) stemming from its eventual consistency mannequin, permitting attackers to retain entry even after defenders delete compromised entry keys.

AWS IAM, like many distributed techniques, employs eventual consistency to scale throughout areas and replicas. Updates to assets akin to entry keys or insurance policies propagate with a predictable delay of roughly 3-4 seconds, as confirmed by way of OFFENSAI’s testing throughout areas like us-east-1 and eu-central-1.

Throughout this window, deleted keys stay legitimate for API calls, enabling attackers to checklist keys receiving an empty array or generate new ones earlier than invalidation completes.​

Entry key used after deletion

Safety agency OFFENSAI has uncovered that in a simulated assault, a defender executes aws iam delete-access-key –access-key-id AKIA… –user-name bob, whereas the attacker quickly follows with aws iam create-access-key –user-name bob.

CloudTrail logs precisely file each the deletion and subsequent actions, but the consistency lag permits persistence. This extends past keys to coverage attachments, position deletions, and login profiles, amplifying dangers in incident response.​

Persistence inside keys

Conventional playbooks fail right here: attaching deny-all insurance policies like AWSDenyAll yields the identical window, as attackers detect and detach them by way of polling ListAccessKeys or comparable APIs.

AWS’s personal Credential Cleanup Process, printed on re:Publish, advises ready full propagation durations however proves inefficient in opposition to proactive attackers who preempt coverage enforcement.

Publish-disclosure testing revealed partial fixes. A deleted key now blocks new key creation, however gaps persist. Attackers can nonetheless detect adjustments and deploy assumable roles with AdministratorAccess from exterior accounts.

OFFENSAI recommends account-level Service Management Insurance policies (SCPs) by way of AWS Organizations to disclaim all actions for compromised principals, as attackers lack SCP management.

After propagation, proceed with cleanup. AWS acknowledged the findings in April 2025, making use of growth fixes and documentation updates with out classifying it as a vulnerability. Retests shared on December 5, 2025, align with their evaluation, urging playbook revisions.​

No in-the-wild exploits surfaced. Organizations ought to combine such delays into detection guidelines, favoring IAM roles and STS short-term credentials over long-term keys to reduce publicity.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AWS, Consistency, Eventual, Exploit, Hackers, IAM, Persistence

Post navigation

Previous Post: New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide
Next Post: Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware

Related Posts

Apache Syncope Groovy RCE Vulnerability Let Attackers Inject Malicious Code Cyber Security News
Palo Alto Networks GlobalProtect Vulnerability Allows Root User Privilege Escalation Cyber Security News
Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User Cyber Security News
First-ever AI-powered ‘MalTerminal’ Malware uses OpenAI GPT-4 to Generate Ransomware Code Cyber Security News
10 Best API Protection Tools in 2025 Cyber Security News
New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks
  • Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT
  • Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware
  • Hackers Exploit AWS IAM Eventual Consistency for Persistence
  • New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks
  • Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT
  • Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware
  • Hackers Exploit AWS IAM Eventual Consistency for Persistence
  • New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark