Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories

Posted on January 16, 2026January 16, 2026 By CWS

A vital misconfiguration in AWS CodeBuild enabled unauthenticated attackers to grab management of key AWS-owned GitHub repositories, together with the extensively used AWS JavaScript SDK powering the AWS Console itself.

This provide chain vulnerability threatened platform-wide compromise, probably injecting malicious code into purposes and the Console throughout numerous AWS environments.

AWS Console Provide Chain Assault

Safety agency Wiz Analysis has uncovered that CodeBreach originated from unanchored common expression patterns in CodeBuild webhook filters for the ACTOR_ID parameter, which ought to limit builds to trusted GitHub person IDs.

With out ^ and $ anchors, the filter matched any person ID containing an accepted substring, permitting bypass by way of “eclipse” occasions the place new, longer GitHub IDs incorporate older maintainer IDs.

AWS Console Provide Chain Assault

GitHub’s sequential ID task, creating about 200,000 every day, made such overlaps frequent for the focused 6-7 digit IDs in 4 AWS repos: aws/aws-sdk-js-v3, aws/aws-lc, corretto/amazon-corretto-crypto-provider, and awslabs/open-data-registry.

Attackers exploit this by mass-creating GitHub Apps by way of the manifest stream to race for eclipse IDs, then submitting pull requests that set off privileged builds.

In a proof-of-concept towards aws/aws-sdk-js-v3 (PR #7280), hidden payload code dumped reminiscence to extract a GitHub Private Entry Token (PAT) from the aws-sdk-js-automation account, regardless of prior mitigations from the 2025 Amazon Q incident.

CodeBreach Exploit

The PAT granted repo and admin:repo_hook scopes, enabling collaborator invitations for admin escalation and direct most important department pushes.

Compromising the JavaScript SDK risked infecting its weekly NPM releases, affecting 66% of scanned cloud environments and the AWS Console, which bundles latest SDK variations with person credentials, Wiz stated to CybersecurityNews.

The stolen PAT additionally managed associated non-public repos, amplifying provide chain dangers akin to Nx S1ngularity or the Amazon Q assault (AWS-2025-015). Wiz halted escalation post-PoC, responsibly disclosing on August 25, 2025.

Affected RepositoriesMaintainer ID ExampleEclipse Frequencyaws/aws-sdk-js-v3Short 6-7 digitsEvery ~5 daysaws/aws-lcShort 6-7 digitsEvery ~5 dayscorretto/amazon-corretto-crypto-providerShort 6-7 digitsEvery ~5 daysawslabs/open-data-registryShort 6-7 digitsEvery ~5 days

AWS fastened the regex flaw inside 48 hours, revoked tokens, hardened reminiscence protections, audited public builds, and confirmed no exploitation by way of logs.

No buyer information was impacted. New options like Pull Request Remark Approval and CodeBuild-hosted runners now block untrusted builds.

Customers ought to anchor webhook regexes, use fine-grained PATs with minimal scopes, allow PR approval gates, and scan for weak setups by way of Wiz queries.

AWS urged disabling auto-PR builds from untrusted sources. The assault stream diagram highlights the trail from malicious PR to Console threat.

This underscores CI/CD as prime targets: complicated, privilege-rich, and untrusted-input uncovered. Public disclosure adopted on January 15, 2026.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attack, Attackers, AWS, Chain, Console, GitHub, Hijack, Lets, Repositories, Supply

Post navigation

Previous Post: Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways
Next Post: Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks

Related Posts

New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials Cyber Security News
New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys Cyber Security News
Bitter APT Hackers Exploit WinRAR Zero-Day Via Weaponized Word Documents to Steal Sensitive Data Cyber Security News
NHS Investigating Oracle EBS Hack Following Cl0p Ransomware Group Claim Cyber Security News
Microsoft Reveals Techniques To Defending Against Advancing AiTM Attacks Cyber Security News
NVIDIA Triton Vulnerability Let Attackers Trigger DoS Attack Using Malicious Payload Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cisco 0-Day RCE Secure Email Gateway Vulnerability Exploited in the Wild
  • Cisco Patches Vulnerability Exploited by Chinese Hackers
  • Google Rolls Out Long-Awaited @gmail.com Email Change Feature for Users
  • Former CISA Director Jen Easterly Appointed CEO of RSAC
  • China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cisco 0-Day RCE Secure Email Gateway Vulnerability Exploited in the Wild
  • Cisco Patches Vulnerability Exploited by Chinese Hackers
  • Google Rolls Out Long-Awaited @gmail.com Email Change Feature for Users
  • Former CISA Director Jen Easterly Appointed CEO of RSAC
  • China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark