By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Tech News

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

By Viral Trending Content 5 Min Read
Share
SHARE

Feb 14, 2025Ravie LakshmananVulnerability / DevOps

Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code execution within the Amazon Web Services (AWS) account.

“If executed at scale, this attack could be used to gain access to thousands of accounts,” Datadog Security Labs researcher Seth Art said in a report shared with The Hacker News. “The vulnerable pattern can be found in many private and open source code repositories.”

At its heart, the attack is a subset of a supply chain attack that involves publishing a malicious resource and tricking misconfigured software into using it instead of the legitimate counterpart.

Cybersecurity

The attack exploits the fact that anyone can AMI, which refers to a virtual machine image that’s used to boot up Elastic Compute Cloud (EC2) instances in AWS, to the community catalog and the fact that developers could omit to mention the “–owners” attribute when searching for one via the ec2:DescribeImages API.

Put differently, the name confusion attack requires the below three conditions to be met when a victim retrieves the AMI ID through the API –

  • Use of the name filter,
  • A failure to specify either the owner, owner-alias, or owner-id parameters,
  • Fetching the most the recently created image from the returned list of matching images (“most_recent=true”)

This leads to a scenario where an attacker can create a malicious AMI with a name that matches the pattern specified in the search criteria, resulting in the creation of an EC2 instance using the threat actor’s doppelgänger AMI.

This, in turn, grants remote code execution (RCE) capabilities on the instance, allowing the threat actors to initiate various post-exploitation actions.

All an attacker needs is an AWS account to publish their backdoored AMI to the public Community AMI catalog and opt for a name that matches the AMIs sought by their targets.

“It is very similar to a dependency confusion attack, except that in the latter, the malicious resource is a software dependency (such as a pip package), whereas in the whoAMI name confusion attack, the malicious resource is a virtual machine image,” Art said.

Datadog said roughly 1% of organizations monitored by the company were affected by the whoAMI attack, and that it found public examples of code written in Python, Go, Java, Terraform, Pulumi, and Bash shell using the vulnerable criteria.

Following responsible disclosure on September 16, 2024, the issue was addressed by Amazon three days later. When reached for comment, AWS told The Hacker News that it did not find any evidence that the technique was abused in the wild.

“All AWS services are operating as designed. Based on extensive log analysis and monitoring, our investigation confirmed that the technique described in this research has only been executed by the authorized researchers themselves, with no evidence of usage by any other parties,” the company said.

Cybersecurity

“This technique could affect customers who retrieve Amazon Machine Image (AMI) IDs via the ec2:DescribeImages API without specifying the owner value. In December 2024, we introduced Allowed AMIs, a new account-wide setting that enables customers to limit the discovery and use of AMIs within their AWS accounts. We recommend customers evaluate and implement this new security control.”

As of last November, HashiCorp Terraform has started issuing warnings to users when “most_recent = true” is used without an owner filter in terraform-provider-aws version 5.77.0. The warning diagnostic is expected to be upgraded to an error effective version 6.0.0.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Best Fitness Tracker 2026: Fitbits, Bands & Hybrids

Your Photos Are Probably Giving Away Your Location. Here’s How to Stop That

Critical Fortinet Forticlient EMS flaw now exploited in attacks

21 organisations currently adding to their engineering teams

M5 Ultra Mac Studio Leaks: 8K Video and GPU Benchmarks

TAGGED: AWS, Cloud security, Cyber Security, Cybersecurity, DevOps, Infrastructure Security, Internet, Remote Code Execution, supply chain attack, Terraform, Threat Intelligence, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Google launches new supervision tools for parents
Next Article NYSE proposes rule change to allow ETH staking on Grayscale’s spot Ether ETFs
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Dimension 20 Is Finally Doing A Vampire: The Masquerade Campaign And I Am So Stoked
Gaming News
Brush up: How to plan a creative holiday in Europe
Travel
Best Fitness Tracker 2026: Fitbits, Bands & Hybrids
Tech News
Your Photos Are Probably Giving Away Your Location. Here’s How to Stop That
Tech News
Critical Fortinet Forticlient EMS flaw now exploited in attacks
Tech News
Is it time Premier League Darts introduced a reserve player for withdrawals?
Sports
Jefferies screams buy on HDFC Bank, says valuation attractive after 25% dip
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Dimension 20 Is Finally Doing A Vampire: The Masquerade Campaign And I Am So Stoked

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Dimension 20 Is Finally Doing A Vampire: The Masquerade Campaign And I Am So Stoked
March 30, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?