A New Malicious “whoAMI” Assault Utilizes AWS AMI Name Mix-up for Executing Remote Code

A recent discovery by cybersecurity experts reveals a novel form of name confusion assault known as whoAMI.

A recent discovery by cybersecurity experts reveals a novel form of name confusion assault known as whoAMI. This attack enables any individual deploying an Amazon Machine Image (AMI) under a particular name to achieve code execution privileges within the Amazon Web Services (AWS) account.
In a report by Datadog Security Labs, researcher Seth Art warned, “If carried out on a large scale, this breach could potentially compromise thousands of accounts.”

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.