Categories: Cyber Security News

Hackers Abuse AWS X-Ray as Covert Command-and-Control Channel

A new framework, XRayC2, demonstrates how attackers can repurpose Amazon Web Services’ X-Ray distributed tracing service into a stealthy command-and-control (C2) channel, bypassing conventional network security controls with authentic AWS API traffic.

Exploiting Cloud Infrastructure for Stealth Operations

Traditional C2 setups depend on attacker-controlled servers and generate detectable anomalies—suspicious domains, unknown IP addresses, irregular traffic patterns, and certificate oddities.

XRayC2 instead leverages AWS X-Ray’s built-in annotation feature to embed encrypted key-value data within trace segments, routing all communications through legitimate AWS domains such as xray.<region>.amazonaws.com.

This method blends malicious payloads with standard monitoring data, thwarting detection tools that focus solely on traffic origin or volume.

The toolkit uses three distinct phases:

  • Beacon Phase: Compromised hosts submit initial trace segments containing encoded metadata (service markers, implant ID, OS details).
  • Command Delivery Phase: Operators push base64-encoded instructions into X-Ray annotations, which implants retrieve during routine polling.
  • Exfiltration Phase: Execution outputs are encoded back into trace segments and harvested by the controller.
    Randomized beacon intervals (30–60 seconds) combined with AWS SigV4 authentication produce genuine CloudWatch logs indistinguishable from benign traffic.

Framework Deployment and Capabilities

Deploying XRayC2 requires an AWS Identity and Access Management user provisioned with “AWSXRayDaemonWriteAccess” and custom permissions for PutTraceSegmentsGetTraceSummaries, and BatchGetTraces across all resources.

The toolkit auto-generates zero-dependency implants for macOS, Linux, and Windows, enabling straightforward deployment without additional software.

The controller UI offers comprehensive implant management, listing active hosts, selecting targets, issuing commands, and viewing implant status while maintaining persistence via X-Ray’s infrastructure.

Implications and Detection Strategies

XRayC2’s abuse of a trusted cloud service highlights the evolution of stealthy attack vectors.

must expand monitoring beyond network-level indicators to include:

  • API Call Context Analysis: Inspect annotation payload sizes, frequencies, and parameter usage.
  • Trace Metadata Correlation: Compare trace maps against known service architectures to spot anomalies.
  • Behavioral Baselines: Establish normal X-Ray usage patterns and flag deviations in trace counts or content.

Combining these measures with traditional threat intelligence and anomaly detection solutions will be critical for identifying and mitigating cloud-based C2 operations.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

The post Hackers Abuse AWS X-Ray as Covert Command-and-Control Channel appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Replaced Review

Between the ubiquitous virtual assistants cheerfully patronising us from almost every electronic device and the…

45 minutes ago

The Tiny Firebat AM02 Ryzen 5 6600H Mini PC Is a Complete Windows 11 System at Just $250

If you're a Windows user who's looking for a PC version of the Apple Mac…

2 hours ago

Agreement With Toll Road Operator

FORT WAYNE, Ind. (WOWO) — The state of Indiana has agreed to let the Indiana…

3 hours ago

Multiple Storm Rounds

FORT WAYNE, Ind. (WOWO) — Severe thunderstorms are expected to move across central Indiana in…

3 hours ago

Universal Pictures at CinemaCon 2026: Everything Revealed

Universal Pictures and Focus Features have taken the stage at CinemaCon. We're expecting new looks…

3 hours ago

Tax Day 2026: Democrats and Republicans battle over impact of new Trump tax cuts

Maritza Montejo, a Liberty Tax Service office manager, helps Aurora Hernandez, left, with her taxes…

3 hours ago

This website uses cookies.