Attacks against AWS infrastructure

Attack types

ECS Task Definition exploit

In their blog post, Rhino Security Labs describe how to weaponize ECS task definitions to steal access keys and other information: https://rhinosecuritylabs.com/aws/weaponizing-ecs-task-definitions-steal-credentials-running-containers/

Last updated