Dubbed LLMjacking, this attack vector targets non-human identities (NHIs) – API keys, service accounts, and machine credentials – to bypass traditional security controls and monetize stolen generative AI access.
Security firm Entro Labs recently exposed functional AWS keys across GitHub, Pastebin, and Reddit to study attacker behavior.
Their research uncovered a systematic four-phase attack pattern:
Credential Harvesting: Automated bots scan public repositories and forums using Python scripts to detect valid credentials, with 44% of NHIs exposed via code repositories and collaboration platforms.
Rapid Validation: Attackers performed initial API calls like GetCostAndUsage within 9-17 minutes of exposure to assess account value, avoiding predictable calls like GetCallerIdentity to evade detection.
Model Enumeration: Intruders executed GetFoundationModelAvailability requests via AWS Bedrock to catalog accessible LLMs – including Anthropic’s Claude and Amazon Titan – mapping available attack surfaces.
Exploitation: Automated InvokeModel attempts targeted compromised endpoints, with researchers observing 1,200+ unauthorized inference attempts per hour across experimental keys.
The Storm-2139 cybercrime group recently weaponized this methodology against Microsoft Azure AI customers, exfiltrating API keys to generate dark web content. Forensic logs show attackers:
Entro’s simulated breach revealed attackers combining automated scripts with manual reconnaissance – 63% of initial accesses used Python SDKs, while 37% employed Firefox user agents for interactive exploration via AWS console.
Uncontained LLMjacking poses existential risks:
With attackers operationalizing leaks in under 20 minutes, real-time secret scanning and automated rotation are no longer optional safeguards but critical survival mechanisms in the LLM era.
Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.
The post Hackers Hijacking Access to Cloud-based AI Models With Exposed Keys in 19 Minutes appeared first on Cyber Security News.
Animated Icons is an animated icon library that you can easily use as components in…
Service platforms like CloudFlare have long been heralded for providing robust protection for legitimate websites,…
Nine critical vulnerabilities have been discovered in AppArmor, which is a widely used mandatory access…
A significant vulnerability in the GSSAPI Key Exchange patch was applied by numerous Linux distributions…
Meta has launched a suite of advanced anti-scam tools across WhatsApp, Facebook, and Messenger to…
James Gaffney doesn’t think Warner should spend more money than it has. He was behind…
This website uses cookies.