Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit AWS IAM Eventual Consistency for Persistence

Hackers Exploit AWS IAM Eventual Consistency for Persistence

Posted on December 8, 2025December 8, 2025 By CWS

A essential persistence method in AWS Id and Entry Administration (IAM) stemming from its eventual consistency mannequin, permitting attackers to retain entry even after defenders delete compromised entry keys.

AWS IAM, like many distributed techniques, employs eventual consistency to scale throughout areas and replicas. Updates to assets akin to entry keys or insurance policies propagate with a predictable delay of roughly 3-4 seconds, as confirmed by way of OFFENSAI’s testing throughout areas like us-east-1 and eu-central-1.

Throughout this window, deleted keys stay legitimate for API calls, enabling attackers to checklist keys receiving an empty array or generate new ones earlier than invalidation completes.​

Entry key used after deletion

Safety agency OFFENSAI has uncovered that in a simulated assault, a defender executes aws iam delete-access-key –access-key-id AKIA… –user-name bob, whereas the attacker quickly follows with aws iam create-access-key –user-name bob.

CloudTrail logs precisely file each the deletion and subsequent actions, but the consistency lag permits persistence. This extends past keys to coverage attachments, position deletions, and login profiles, amplifying dangers in incident response.​

Persistence inside keys

Conventional playbooks fail right here: attaching deny-all insurance policies like AWSDenyAll yields the identical window, as attackers detect and detach them by way of polling ListAccessKeys or comparable APIs.

AWS’s personal Credential Cleanup Process, printed on re:Publish, advises ready full propagation durations however proves inefficient in opposition to proactive attackers who preempt coverage enforcement.

Publish-disclosure testing revealed partial fixes. A deleted key now blocks new key creation, however gaps persist. Attackers can nonetheless detect adjustments and deploy assumable roles with AdministratorAccess from exterior accounts.

OFFENSAI recommends account-level Service Management Insurance policies (SCPs) by way of AWS Organizations to disclaim all actions for compromised principals, as attackers lack SCP management.

After propagation, proceed with cleanup. AWS acknowledged the findings in April 2025, making use of growth fixes and documentation updates with out classifying it as a vulnerability. Retests shared on December 5, 2025, align with their evaluation, urging playbook revisions.​

No in-the-wild exploits surfaced. Organizations ought to combine such delays into detection guidelines, favoring IAM roles and STS short-term credentials over long-term keys to reduce publicity.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AWS, Consistency, Eventual, Exploit, Hackers, IAM, Persistence

Post navigation

Previous Post: INE Earns Multiple G2 Winter 2026 Badges Across Global Markets
Next Post: Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware

Related Posts

MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules Cyber Security News
Threat Actors Using Weaponized AV-themed Word and PDF Documents to Attack Israeli Organizations Threat Actors Using Weaponized AV-themed Word and PDF Documents to Attack Israeli Organizations Cyber Security News
Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Cyber Security News
Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks Cyber Security News
ChatGPT Atlas Stores OAuth Tokens Unencrypted Leads to Unauthorized Access to User Accounts ChatGPT Atlas Stores OAuth Tokens Unencrypted Leads to Unauthorized Access to User Accounts Cyber Security News
New Clickfix Attack Exploits finger.exe Tool to Trick Users into Execute Malicious Code New Clickfix Attack Exploits finger.exe Tool to Trick Users into Execute Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News