Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TexMat textile deposit return scheme secures €6 million in EU funding

KTH wins Swedish Research Council nuclear technology grant

Microsoft fixes 114 Windows flaws in January 2026 patch, 1 of which is actively being exploited

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New “Fuami” attacks cause ami name confusion for remote code execution
Identity

New “Fuami” attacks cause ami name confusion for remote code execution

userBy userFebruary 14, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 14, 2025Ravi LakshmananVulnerability / DevOps

Cybersecurity researchers have created a new type of name confusion attack called Whoami, which allows people to publish Amazon Machine Images (AMIs) with specific names that can obtain code execution within Amazon Web Services (AWS) accounts. It is disclosed.

“If executed at scale, this attack can be used to gain access to thousands of accounts,” Datadog Security Labs researcher Seth Art said in a report shared with Hacker News. . “The vulnerable patterns are found in many private and open source code repositories.”

At its heart, this attack is a subset of supply chain attacks that involves exposing malicious resources and tricking software that is misconfigured to use the wrong software in place of a legitimate counterpart. .

Cybersecurity

This attack takes advantage of the fact that AMIs can have an AMI referencing the AMI. This takes advantage of the virtual machine images used to boot up AWS elastic computing cloud (EC2) instances, community catalogs, and the fact that developers can omit to mention “-owner” “Attribute when searching for one via EC2: descriptionimages api.

Put another way, a name confusing attack requires that the victim meet the following three conditions when obtaining an AMI ID via the API –

Get the most recently created images from the returned list of matching images because I couldn’t specify either the name filter use, owner, owner ALIA, or owner and ID parameters (” most_recent = true”)

This leads to a scenario where an attacker can create a malicious AMI with a name that matches the pattern specified in the search criteria, allowing the threat actor to create an EC2 instance.

This gives the instance the Remote Code Execution (RCE) capability, allowing threat actors to initiate various post-exploitation actions.

All the attackers need is an AWS account to publish the background AMI to the public community AMI catalog and select a name that matches the AMIS that the target is looking for.

“The latter is very similar to dependency confusion attacks, whereas malicious resources are software dependencies (such as PIP packages), but with Whoami-name confusion attacks, there is a malicious resource is a virtual machine image,” Art said.

Datadog is vulnerable to public examples of code written in Python, Go, Go, Java, Terraform, Pulumi and Bash Shell, with around 1% of organizations being monitored by the company being affected by Woami attacks. He said he found it using criteria.

Following the responsible disclosure on September 16, 2024, the issue was addressed by Amazon three days later. When asked for comment, AWS told Hacker News it couldn’t find any evidence that the technique was abused in the wild.

“All AWS services operate as designed. Based on extensive log analysis and monitoring, our study shows that the techniques described in this study have no evidence of use by other parties. “We have confirmed that it is being carried out only by the authorized researchers themselves.”

Cybersecurity

“This technique can affect customers who obtain Amazon Machine Image (AMI) ID via EC2: explain the API without specifying the value of the owner. In December 2024, Introducing AMIS, a new account-wide setting that allows customers to limit discovery, and using AMIS within AWS accounts.

As of November last year, Hashicorp Terraform began issuing warnings to users if “most_recent = true” is used without owner filters for Terraform-provider-aws version 5.77.0. Warning diagnostics are expected to be upgraded to Error Effects Version 6.0.0.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLazarus Group deploys MarStech1 JavaScript implants to target developer attacks
Next Article Meta will enter the AI ​​Humanoid Race with the launch of a new robotics division to compete with Tesla.
user
  • Website

Related Posts

Microsoft fixes 114 Windows flaws in January 2026 patch, 1 of which is actively being exploited

January 14, 2026

Critical vulnerability in Node.js could cause server crash via async_hooks stack overflow

January 14, 2026

PLUGGYAPE malware uses Signal and WhatsApp to target Ukrainian Armed Forces

January 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TexMat textile deposit return scheme secures €6 million in EU funding

KTH wins Swedish Research Council nuclear technology grant

Microsoft fixes 114 Windows flaws in January 2026 patch, 1 of which is actively being exploited

Why the world is turning to Greenland’s rare earth metals

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.