Security News > 2025 > February > New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

2025-02-14 18:42
Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code execution within the Amazon Web Services (AWS) account. "If executed at scale, this attack could be used to gain access to thousands of accounts," Datadog Security Labs researcher Seth Art said in a report
News URL
https://thehackernews.com/2025/02/new-whoami-attack-exploits-aws-ami-name.html
Related news
- WordPress security plugin WP Ghost vulnerable to remote code execution bug (source)
- Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility (source)
- Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks (source)
- PoisonSeed Exploits CRM Accounts to Launch Cryptocurrency Seed Phrase Poisoning Attacks (source)
- ActiveX blocked by default in Microsoft 365 because remote code execution is bad, OK? (source)
- Hackers abuse Zoom remote control feature for crypto-theft attacks (source)
- Craft CMS RCE exploit chain used in zero-day attacks to steal data (source)
- How cybercriminals exploit psychological triggers in social engineering attacks (source)