
March 10, 2025
🥖 Palette Cleanser
Hello folks,
Guess who's back, back again? DG's back, tell a friend. It's issue 200! Thank you Cynthia for taking care of all of you while I was gallivanting around Europe. I apologize for the bad jokes and pop culture references you have to endure once again.
Crypto drama lovers may have heard of the recent $1.5 billion Bybit heist. That's about 60 million tins worth of Milo in crypto, gone. Safe{Wallet}’s investigation summary states, "The attack involved the compromise of a Safe{Wallet} developer’s laptop (Developer1) and the hijacking of AWS session tokens to bypass multi-factor authentication (MFA) controls." Almost no one has developer workstations in their AWS threat model, yet this is the path of least resistance for most red teams. Something to ponder over a cup of Milo—unless North Korea decides to buy up the entire global supply with its bounty.
This wasn't intended to be a call to arms, but... If you want to get into hacking AWS for Milo, crypto or just to be a better security professional, Nick Frichette will help you get started. He did a wonderful talk at Wild West Hackin' Fest titled, "I Want You to Hack AWS: Cloud Penetration Testing for Traditional Hackers", which is now available for everyone to watch. Nick has an engaging, polished style that makes the audience feel like becoming a cloud security tester is totally doable.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
📋 Chef's selections
-
DIY — Evaluating AWS Native Approaches for Detecting Suspicious API Calls by Adan Álvarez Vilchez
Security alerting is much harder than it looks. I don't recommend building your own security alerting because you're almost guaranteed to screw it up. However, it's also a good thing to understand and explore so you understand the rough edges and traps. Adan compares three AWS native architectures that describe the trade-offs, including hard numbers on performance. If you want some free basic security alerting, try the AWS Security Survival Kit, which comes with pre-canned basic alerts.
-
JavaGhost’s Persistent Phishing Attacks From the Cloud by Margaret Kelley
We've covered SES phishing abuse many times in this prestigious newsletter; however, none of the articles have had the level of depth and detail found in this one. Margaret goes through all the API calls used by this threat actor, their IAM policies, and even includes screenshots from web console activity. The thing that struck me is just how bad the situation must be when a threat actor can continue to use security groups named 'Java_Ghost,' with the group description 'We Are There But Not Visible,' and still be wildly successful. Maybe there should be an alert for that?
-
AWS CloudFormation Phishing Attack: A Growing Threat by Victor Grenu
If you wanted to hack AWS environments, you could learn all the stuff Nick Frichette teaches or break into developer laptops like North Korea. OR, you could just send people emails, asking them nicely to execute CloudFormation stacks for you. Victor, who incidentally started AWS Security Digest, gives us a worked example of a recent Amazon-branded phishing campaign he's observed, along with advice for prevention and detection.
🥗 AWS security blogs
- 📣 AWS WAF adds JA4 fingerprinting and aggregation on JA3 and JA4 fingerprints for rate-based rules
- 📣 Amazon EKS now envelope encrypts all Kubernetes API data by default
- 📣 AWS WAF is now available in two additional AWS regions
- 📣 IAM Access Analyzer now supports Internet Protocol Version 6 (IPv6)
- 📣 AWS Secrets Manager increases the API Requests per Second limits
- 📣 Amazon Cognito now supports access token customization for machine-to-machine (M2M) authorization flows
- How Thales Enables PCI-DSS Compliance with a Tokenization Solution on AWS by Nizar Kheir
- Introducing managed integrations for AWS IoT Device Management (Preview) by Rahul Shira
- How to use AWS WAF Bot Control for Targeted Bots signals and mitigate evasive bots with adaptive user experience by Kartik Bheemisetty
- Self-hosting source code of the Landing Zone Accelerator on AWS by Josh Franklin
- Securely onboarding countries to the AWS Cloud by Dusko Karaklajic
- AWS completes the annual Dubai Electronic Security Centre certification audit to operate as a Tier 1 cloud service provider in the Emirate of Dubai by Vishal Pabari
🍛 Reddit threads on r/aws
💸 Sponsor shoutout
Have you got a long list of AWS security issues you could fix but no idea how bad any of it really is?
Get a Plerion demo. Focus on the 1% of risks that matter & achieve better security outcomes.
🤖 Dessert
Dessert is made by robots, for those that enjoy the industrial content.
🧁 IAM permission changes
🍪 API changes
- Agents for Amazon Bedrock Runtime
- Agents for Amazon Bedrock
- Amazon Elastic Compute Cloud
- Elastic Load Balancing
- Amazon Bedrock
- Amazon Interactive Video Service RealTime
- Redshift Data API Service
- AWS WAFV2
- Amazon WorkSpaces
- AWS DataSync
- Amazon GameLift Streams
- AWS IoT FleetWise
- Amazon WorkSpaces
- Managed integrations for AWS IoT Device Management
- AWS IoT SiteWise
- Amazon Cognito Identity Provider
- Amazon Elastic Compute Cloud
- QBusiness
- CloudWatch RUM
- Amazon SageMaker Service
🍹 IAM managed policy changes
- AWSFaultInjectionSimulatorECSAccess
- AmazonDataZoneGlueManageAccessRolePolicy
- AmazonDataZoneRedshiftManageAccessRolePolicy
- AmazonRDSCustomPreviewServiceRolePolicy
- AmazonRDSCustomServiceRolePolicy
- AWSECRPullThroughCache_ServiceRolePolicy
- SageMakerStudioProjectProvisioningRolePolicy
- AWSIoTManagedIntegrationsRolePolicy
- AWSIoTManagedIntegrationsFullAccess
- AWSEC2CapacityReservationFleetRolePolicy
- AmazonEMRServicePolicy_v2
- SageMakerStudioProjectProvisioningRolePolicy
☕ CloudFormation resource changes
🎮 Amazon Linux vulnerabilities
-
No new CVEs.
📺 AWS Security Bulletins
-
No bulletins this week.