Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»AI Accelerates Breach of AWS Environment
    Cybersecurity

    AI Accelerates Breach of AWS Environment

    adminBy adminFebruary 3, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    AI Accelerates Breach of AWS Environment
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Attackers used a combination of found credentials and artificial intelligence (AI) to gain administrative access to an Amazon Web Services (AWS) environment in less than 10 minutes. The incident demonstrates once again how AI is rapidly becoming a force multiplier for threat actors to move more quickly than ever.

    A threat actor gained initial access to the environment via credentials discovered in public Simple Storage Service (S3) buckets and then quickly escalated privileges during the attack, which moved laterally across 19 unique AWS principals, the Sysdig Threat Research Team (TRT) revealed in a report published Tuesday. 

    Throughout the attack, which occurred on Nov. 28, 2025, the threat actor leveraged large language models (LLMs) to automate reconnaissance, generate malicious code, and make real-time decisions, according to researchers. In fact, it appears that using LLMs played a pivotal role in both the speed with which attackers operateed and the agility with which they moved laterally, according to Sysdig.

    Related:Attackers Harvest Dropbox Logins Via Fake PDF Lures

    “This attack stands out for its speed, effectiveness, and strong indicators of AI-assisted execution,” Sysdig researchers Alessandro Brucato and Michael Clark wrote in the report. 

    During the attack, the threat actor collected and exfiltrated data from the cloud environment, provisioned GPU instances on Elastic Compute Cluster (EC2) for potential resource abuse or LLM model development, and abused Amazon Bedrock, an AI app-dev environment, for LLMjacking to gain access to cloud-hosted models.

    Major Credential Gaffe Kicks Off Attack

    While the speed and apparent use of AI were among the most notable aspects of the attack, the researchers also called out the way that the attacker accessed exposed credentials as a cautionary tale for organizations with cloud environments. Indeed, stolen credentials are often an attacker’s initial access point to attack a cloud environment.

    “Leaving access keys in public buckets is a huge mistake,” the researchers wrote. “Organizations should prefer IAM roles instead, which use temporary credentials. If they really want to leverage IAM users with long-term credentials, they should secure them and implement a periodic rotation.”

    Moreover, the affected S3 buckets were named using common AI tool naming conventions, they noted. The attackers actively searched for these conventions during reconnaissance, enabling them to find the credentials quite easily, they said.

    AI Accelerates Attack

    The attacker demonstrated use of AI and LLMs across various stages to both develop and accelerate the attack. At the same time, hijacking LLMs and making use of the cloud for their own development of models also appeared to be part of the objective of attackers. 

    Related:Fortinet Firewalls Hit With Malicious Configuration Changes

    The compromised credentials used by the attacker had only the ReadOnlyAccess policy attached to its user group, so the actor used Lambda function code injection — replacing the code of an existing Lambda function named “EC2-init” three times, iterating on their target user — to eventually gain access to an account for a user called “frick” who had admin privileges.

    During this privilege-escalation part of the attack — which took a mere eight minutes — the actor wrote code in Serbian, suggesting their origin. Moreover, the use of comments, comprehensive exception handling, and the speed at which the script was written “strongly suggests LLM generation,” the researchers wrote.

    The attacker also demonstrated LLM-assisted activity in its lateral movement, in which it made several attempts to assume multiple roles — including cross-account roles — by enumerating account IDs and attempting to assume OrganizationAccountAccessRole in all environments, regardless of whether the targets were member accounts.

    “Curiously, they included account IDs that did not belong to the organization: two IDs with ascending and descending digits … and one ID that may belong to a real external account,” the researchers wrote. “This behavior is consistent with patterns often attributed to AI hallucinations.”

    Related:Google Gemini Flaw Turns Calendar Invites Into Attack Vector

    AI as Objective of the Attack

    The threat actor also conducted LLMjacking during the account by targeting the environment’s implementation of Bedrock. Attackers invoked a broad range of AI models, including multiple versions of Anthropic’s Claude, DeepSeek R1, Meta’s Llama 4 Scout, Amazon’s Nova and Titan models, and Cohere’s embedding service.

    To access some Claude models, the attackers programmatically interacted with AWS Marketplace APIs, accepting usage agreements on the victim’s behalf. They also used cross-region inference profiles to distribute model invocations across different AWS regions, a technique that can improve performance while complicating detection, the researchers noted. 

    After finishing with Bedrock, the actor pivoted to hijacking GPUs, likely for model training or resale. Throughout this process, hallucinated elements in the training script reinforce the notion that the actor used LLM generation during the process, they added.

    Detection and Mitigation Steps

    Of course, the entire attack could have been avoided had the organization not made the “mundane error” of leaving valid credentials exposed in public S3 buckets, Jason Soroko, senior fellow at Sectigo, tells Dark Reading in an email. Avoiding such an error is one way to prevent such intrusions, he says.

    “This failure represents a stubborn refusal to master security fundamentals,” Soroko says. “It is impossible to defend a cloud environment when the keys are left visible to anyone who bothers to look.”

    Still, the use of AI during the attack is worrisome, experts say, and they expect these attacks to become more commonplace. Indeed, 2026 does seem to be poised to be the year in which AI hits critical mass as both a threat enabler and attack surface.

    “AI … removes hesitation,” Shane Barney, chief information security officer (CISO) at Keeper Security, says. “Tasks that once took hours of manual trial and error are now executed continuously and decisively. Enumeration, privilege testing and lateral movement collapse into a single, rapid sequence, and defenders lose the buffer time they have historically relied on to detect and respond.”

    That speed is where AI is fundamentally changing the threat landscape, and the use of AI hallucinations demonstrated in the attack “will become rarer as offensive agents increase their accuracy and awareness of target environments,” according to the Sysdig researchers.

    To defend this accelerating threat landscape, they said organizations must prioritize runtime detection and least-privilege enforcement, among other mitigation efforts that were outlined in the report.

    Accelerates AWS Breach Environment
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article6 Ways to Build a Search Everywhere Optimization Strategy for 2026
    Next Article Android 16 February 2026 security update goes live, and you might find it surprising
    admin
    • Website

    Related Posts

    SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

    March 3, 2026

    AI went from assistant to autonomous actor and security never caught up

    March 3, 2026

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Best High-Yield Checking Accounts for March 2026

    March 3, 2026

    This amazing ESP32 projector integrates with Home Assistant and displays whatever you want

    March 3, 2026

    SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

    March 3, 2026

    Google Clarifies How It Picks Thumbnails For Search, Discover

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (572)
    • Privacy & Online Earning (80)
    • SEO & Digital Marketing (357)
    • Tech Tools & Mobile / Apps (709)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Best High-Yield Checking Accounts for March 2026

    March 3, 2026

    This amazing ESP32 projector integrates with Home Assistant and displays whatever you want

    March 3, 2026

    SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

    March 3, 2026
    Most Popular
    • Best High-Yield Checking Accounts for March 2026
    • This amazing ESP32 projector integrates with Home Assistant and displays whatever you want
    • SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More
    • Google Clarifies How It Picks Thumbnails For Search, Discover
    • These budget-friendly wireless earbuds deliver a pleasant experience while still being easy on the wallet
    • AI went from assistant to autonomous actor and security never caught up
    • Segway Cube 1000 Portable Power Station hits lowest price ever!
    • How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.