Researchers on Tuesday identified a new potential attack vector in which by exploiting the AWS Elastic IP Transfer (EIP) feature, threat actors with existing controls over an AWS account can compromise an IP address then launch credential theft and phishing attacks.
The Mitiga researchers said they had notified the AWS security team about its findings before posting the Dec. 20 blog and incorporated feedback from AWS into the piece, which included a full explanation of how to use the new EIP feature and how to report abuse.
This is a classic example of abusing a feature for unintended purposes, said Mike Parkin, senior technical engineer at Vulcan Cyber. Parkin said AWS was trying to make it easier for organizations to move IP addresses around for legitimate reasons, so naturally threat actors found a way to abuse it.
“The technique requires the threat actor to already have access to the victim’s space, which mitigates the risk somewhat,” Parkin explained. “However, if they can get addresses under their control, they can use them to bypass various IP based defenses and that’s the deeper issue. Using just an IP address is not really a reliable way to provide security. Fortunately, there are ways to mitigate the risk using tools built into AWS.”
John Bambenek, principal threat hunter at Netenrich, added that the most immediate risk is for resources that are currently running and have existing DNS records associated with them. As those are two different systems, Bambenek said changing ownership on an IP won’t automatically make a change in DNS.
“Therefore, a similar attack to domain hijacking is possible,” Bambenek said. “People simply trust when they go to www.domain.com that they are going where they intend. But if attackers takeover the IP, they can do any number of brand management attacks, such as credential theft or phishing, with ease and most existing security tools would not flag it as a problem.”