Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI-Powered Hackers Breach AWS in Under 10 Minutes

AI-Powered Hackers Breach AWS in Under 10 Minutes

Posted on February 4, 2026 By CWS

AI Accelerates Cloud Attack Timelines

In a groundbreaking incident in November 2025, cybercriminals harnessed artificial intelligence to drastically reduce the time required for cloud attacks. The Sysdig Threat Research Team (TRT) revealed that these threat actors achieved AWS administrative access in under 10 minutes, showcasing the rapid evolution and sophistication of AI-facilitated cyber threats.

The attackers leveraged large language models (LLMs) to perform automated reconnaissance, generate harmful code, and make real-time attack decisions. Their target was an Amazon Web Services (AWS) environment, marking a significant shift in how quickly and efficiently cyber threats can emerge in cloud settings.

Exploiting AWS Credentials

The breach commenced when attackers discovered legitimate AWS credentials in publicly available Simple Storage Service (S3) buckets containing Retrieval-Augmented Generation (RAG) data for AI models. These credentials belonged to an Identity and Access Management (IAM) user with permissions on AWS Lambda and limited access to Amazon Bedrock.

Using a ReadOnlyAccess policy, the attackers conducted extensive reconnaissance across various AWS services, including Secrets Manager, EC2, and CloudWatch. They then manipulated permissions on Lambda to insert malicious code into an existing function, ultimately gaining admin access by creating new access keys.

Advanced Tactics and AI Utilization

Throughout the operation, the attackers demonstrated advanced techniques, likely assisted by AI tools. The code injection into Lambda was marked by comprehensive exception handling and comments in Serbian, hinting at the attackers’ possible origins. Attempts to assume roles in fabricated AWS accounts and references to non-existent repositories further illustrated AI’s role in this attack.

In addition to compromising multiple AWS principals, the attackers created a backdoor user, enabling persistent access. They disabled model invocation logging and initiated ‘LLMjacking’ operations, invoking several AI models within Amazon Bedrock.

Resource Exploitation and Defense Measures

Expanding their exploitation, the attackers provisioned expensive EC2 instances to run deep learning applications, circumventing AWS credentials by installing a JupyterLab server. They used an IP rotation tool to evade detection, showcasing a sophisticated level of evasion tactics.

To mitigate such threats, organizations are urged to enforce the principle of least privilege for IAM users, restrict critical permissions, ensure secure bucket configurations, and enhance logging and monitoring. As AI tools become more advanced, these types of attacks may increase, necessitating robust runtime detection and security measures.

Stay informed on cybersecurity trends by following us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:AI security, AI tools, AWS breach, AWS Lambda, cloud attacks, cloud security, credential theft, cyber threats, cybersecurity measures, IAM roles

Post navigation

Previous Post: TRM Labs Secures $70M for AI in Blockchain Security
Next Post: China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia

Related Posts

Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild Cyber Security News
Microsoft SQL Server Vulnerability Let Attackers Escalate Privileges Microsoft SQL Server Vulnerability Let Attackers Escalate Privileges Cyber Security News
Windows User Account Control Bypassed Using Character Editor to Escalate Privileges Windows User Account Control Bypassed Using Character Editor to Escalate Privileges Cyber Security News
New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access Cyber Security News
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances Cyber Security News
Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News