new-“whoami”-attack-exploits-aws-ami-name-confusion-for-remote-code-execution

Cybersecurity analysts have revealed a novel variant of name ambiguity assault known as whoAMI. This technique permits any individual who releases an Amazon Machine Image (AMI) under a particular name to achieve code execution within an Amazon Web Services (AWS) account.
“If implemented broadly, this assault could facilitate unauthorized entry to numerous accounts,” stated Datadog Security Labs investigator Seth Art in a report.


Leave a Reply

Your email address will not be published. Required fields are marked *

Share This