Friday, April 25, 2025
HomeAmazon AWSCybercriminals Exploit EC2 Instance Metadata Vulnerability to Launch Attacks on Hosted Websites

Cybercriminals Exploit EC2 Instance Metadata Vulnerability to Launch Attacks on Hosted Websites

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals have launched a sophisticated campaign targeting websites hosted on Amazon Web Services (AWS) EC2 instances.

This campaign, observed in March 2025, exploits a vulnerability in EC2 Instance Metadata through Server-Side Request Forgery (SSRF), allowing attackers to access sensitive information and potentially escalate their attacks.

The Exploitation Technique

The attackers are leveraging a combination of two common weaknesses: CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and CWE-918 (Server-Side Request Forgery).

- Advertisement - Google News

They send GET requests to websites hosted on EC2 instances, attempting to retrieve metadata from the instance’s internal IP address (169.254.169.254).

This metadata includes critical information like IAM role credentials, which can be used to gain unauthorized access to AWS resources.

The campaign’s timeline shows a brief but intense period of activity, starting on March 15, 2025, and lasting for four days.

The attackers used multiple IP addresses, all from the same Autonomous System Number (ASN) owned by FBW NETWORKS SAS, a French company.

These IPs displayed uniform behavior in their exploitation attempts, suggesting a coordinated effort by a single actor.

The exposure of EC2 Instance Metadata, particularly through IMDSv1, poses significant risks.

As AWS documentation notes, IMDSv1 data is not protected by authentication or cryptographic methods, making it vulnerable to anyone with direct access to the instance or software running on it.

This vulnerability allows attackers to potentially escalate their privileges within the AWS environment, leading to further exploitation or data breaches.

To mitigate this threat, AWS users are advised to transition from IMDSv1 to IMDSv2, which requires attackers to supply a secret token, significantly reducing the risk of SSRF-based attacks.

Additionally, implementing Web Application Firewall (WAF) rules to block requests to the metadata service IP can prevent unauthorized access.

Other Notable Vulnerabilities

While the EC2 metadata exploit is novel, March 2025 also saw significant activity around several other CVEs:

  • CVE-2017-9841: A PHPUnit Remote Code Execution vulnerability, which saw a massive increase in scanning activity, highlighting the persistent threat of old vulnerabilities.
  • CVE-2023-1389: A TP-Link Archer AX21 Remote Code Execution vulnerability, emphasizing the need for timely patching of network devices.
  • CVE-2024-4577: A PHP-CGI argument injection vulnerability, exploited for deploying malicious software like cryptocurrency miners and Remote Access Trojans.

According to the Report, The exploitation of EC2 Instance Metadata through SSRF underscores the evolving tactics of cybercriminals to target cloud infrastructure.

Organizations must remain vigilant, ensuring their cloud configurations are secure and up-to-date.

The resurgence of interest in older vulnerabilities also serves as a reminder that patching and updating systems are critical to maintaining robust cybersecurity defenses.

As cloud services continue to grow, so too does the sophistication of attacks against them, necessitating a proactive approach to security.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords

A hacker collective known as R00TK1T claims to have breached TikTok's user database, allegedly...

FBI Offers $10 Million Reward for information on Salt Typhoon Hackers

The Federal Bureau of Investigation (FBI), in partnership with the U.S. Department of State,...

Spring Security Vulnerability Exposes Valid Usernames to Attackers

A newly identified security vulnerability, CVE-2025-22234, has exposed a critical weakness in the widely-used...

Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations

Trend Research has uncovered a sophisticated network of cybercrime operations linked to North Korea,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords

A hacker collective known as R00TK1T claims to have breached TikTok's user database, allegedly...

FBI Offers $10 Million Reward for information on Salt Typhoon Hackers

The Federal Bureau of Investigation (FBI), in partnership with the U.S. Department of State,...

Spring Security Vulnerability Exposes Valid Usernames to Attackers

A newly identified security vulnerability, CVE-2025-22234, has exposed a critical weakness in the widely-used...