U.S. markets closed
  • S&P 500

    -1.84 (-0.04%)
  • Dow 30

    -210.22 (-0.62%)
  • Nasdaq

    +121.67 (+0.87%)
  • Russell 2000

    -27.23 (-1.18%)
  • Crude Oil

    -1.14 (-1.58%)
  • Gold

    -88.70 (-4.77%)
  • Silver

    -1.88 (-6.77%)

    -0.0090 (-0.75%)
  • 10-Yr Bond

    -0.0580 (-3.70%)

    -0.0064 (-0.46%)

    -0.4300 (-0.39%)

    -806.09 (-2.09%)
  • CMC Crypto 200

    -31.76 (-3.27%)
  • FTSE 100

    -31.52 (-0.44%)
  • Nikkei 225

    -272.68 (-0.93%)

Lightspin Research Team Discovers Cross-Account Attack Path Leveraging Dangerous S3 Bucket Permissions on AWS

·3 min read

Hackers can achieve public write access to write files to protected S3 buckets and store data at a victim's expense

TEL AVIV, Israel, June 3, 2021 /PRNewswire/ -- Lightspin, a pioneer in contextual cloud security that simplifies and prioritizes cloud security for cloud and Kubernetes environments, announced today the discovery of a new method of cross-account attack, leveraging AWS S3 buckets. If leveraged, this attack can cause a real and measurable impact to a business' bottom line, by opening up certain AWS buckets to unauthorized writes from any AWS account.

Lightspin Logo
Lightspin Logo

Lightspin found this potential misconfiguration as part of its ongoing research into AWS S3 buckets, while researching examples of S3 buckets using the standard AWS bucket permissions. Misconfigured S3 buckets have caused many high-profile attacks, including Booz Allen Hamilton that exposed 60,000 files related to the Dept of Defense and Verizon's recent exposure of more than 6 million customer accounts.

After inspecting 40,000 Amazon S3 buckets, Lightspin found that, on average, the "objects can be public" permission applies to 42% of an organization's objects on AWS overall.
During the research, Lightspin discovered that it's possible for hackers using AWS Cloudtrail and Config to write to buckets held by other accounts even if those buckets aren't public. This is due to the fact that even private buckets can have policies that allow access from any AWS account. Cross-Account attacks on AWS services are difficult to detect and thus can remain undetected for a long time.

"AWS doesn't provide the ability to drill down from a bucket to see the status of all the objects it contains." said Vladi Sandler, CEO of Lightspin. "In order to be sure that objects are "safe", its necessary to go through each object's ACL to check if it is open to the public. We recognize that organizations need better context, so we have developed an open-source scanner that provides exactly this - the visibility and the context to know exactly what objects are publicly accessible, at a glance."

While Lightspin only checked Cloudtrail and Config, other AWS Services that use S3 buckets to store their data by default may also be at risk from this misconfiguration attack path, and in those cases, may even provide read permissions.

For access to the Lightspin research findings,click here. To download the open source scanner to see which objects are publicly accessible click here.

About Lightspin

Lightspin's contextual cloud security protects cloud and Kubernetes environments from build to runtime and simplifies cloud security for security and DevOps teams. Using patent-pending advanced graph-based technology, Lightspin empowers cloud and security teams to eliminate risks and maximize productivity by proactively and automatically detecting all security risks, smartly prioritizing the most critical issues, and easily fixing them. For more information, visit: https://www.lightspin.io/

Media contact:

Wes Rogers


View original content:http://www.prnewswire.com/news-releases/lightspin-research-team-discovers-cross-account-attack-path-leveraging-dangerous-s3-bucket-permissions-on-aws-301305052.html

SOURCE Lightspin