Live
- Woman’s False Claim Sparks Unnecessary Panic
- Locals Report Naxal Activity in Karkala Village
- Mangaluru International Airport Sets New Records in Passenger and Flight Movements
- Where Areca failed, grow Coffee
- Collector Badavath Santosh Reviews Household Survey and Listing Process
- Awareness Session on SHE Team and POCSO Act
- Awareness Program in agricultural College on the Dangers of Drug Abuse for Youth
- 3500-Year-Old Menhir in Kamsanpally Village: A Call for Preservation
- The Role of Artificial Intelligence in Radiology: Transforming Diagnosis and Patient Care
- Hindustan Zinc Ltd. Signs MoU with Rajasthan Government to Invest Rs 36 Crores in Education Development
Just In
Researchers spot 22 AWS APIs that can be abused to leak info
Cyber security firm Palo Alto Networks said on Tuesday it has discovered 22 Amazon Web Services (AWS) Application Programming Interfaces (APIs) across 16 AWS services that can be abused by the attackers to leak information.
New Delhi: Cyber security firm Palo Alto Networks said on Tuesday it has discovered 22 Amazon Web Services (AWS) Application Programming Interfaces (APIs) across 16 AWS services that can be abused by the attackers to leak information.
According to researchers from Unit 42, a Palo Alto Networks threat intelligence team, this class of AWS APIs can be abused to leak the AWS Identity and Access Management (IAM) users and roles in arbitrary accounts across all three AWS partitions (aws, aws-us-gov or aws-cn).
"AWS services that can be potentially abused by attackers include Amazon Simple Storage Service (S3), Amazon Key Management Service (KMS) and Amazon Simple Queue Service (SQS).
"A malicious actor may obtain the roster of an account, learn the organization's internal structure and launch targeted attacks against individuals," Palo Alto Networks researchers claimed in a blog post.
In a recent Red Team exercise, Unit 42 researchers compromised a customer's cloud account with thousands of workloads using a misconfigured IAM role identified by this technique.
The "stealthy" property of the exploit makes detection and prevention difficult.
"Attackers can have unrestricted time to perform reconnaissance on random or targeted AWS accounts without worrying about being noticed," they noted.
AWS which is Amazon's Cloud arm, was yet to react to the report.
AWS is the world's most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centres globally.
According to the researchers, the root cause of the issue is that the AWS backend proactively validates all the resource-based policies attached to resources such as Amazon Simple Storage Service (S3) buckets and customer-managed keys.
"Resource-based policies usually include a Principal field that specifies the identities (users or roles) allowed to access the resource. If the policy contains a nonexistent identity, the API call that creates or updates the policy will fail with an error message," they wrote.
This convenient feature, however, can be abused to check whether an identity exists in an AWS account.
Policy validation is a feature from AWS that facilitates the user experience.
While most users benefit from the feature, adversaries may also find the feature useful for performing reconnaissance in another account.
"Adversaries can repeatedly invoke these APIs with different principals to enumerate the users and roles in a targeted account. Attackers can have unrestricted time to perform reconnaissance on random or targeted AWS accounts without worrying about being noticed," said the researchers.
The Unit 42 team said that detecting and preventing identity reconnaissance using this technique is difficult as there are no observable logs in the targeted accounts.
"However, good IAM security hygiene can still effectively mitigate the threats from this type of attack," they said.
© 2024 Hyderabad Media House Limited/The Hans India. All rights reserved. Powered by hocalwire.com