Amazon's EC2, Eucalyptus hacked

Powered by SC Magazine

Customer accounts could be accessed.

Amazon has fixed a cryptographic hole in its EC2 and S3 services that could allow hackers to hijack customer accounts.

The signature-wrapping and cross site scripting (XSS) attacks hijacked control interfaces used to manage cloud computing resources, which allowed attackers to create modify and delete machine images, and change administrative passwords and settings.

“Effectively, a successful attack on a cloud control interface grants the attacker a complete power over the victim's account, with all the stored data included,” researchers at Germany’s Ruhr University wrote in a paper (pdf).

"We had full access to all customer data, including data authentication, tokens, and even passwords in clear text," researcher Mario Heiderich said.

In one attack, researchers discovered vulnerabilities in control interfaces that were vulnerable to new and known XML signature wrapping attacks.

They had generated arbitrary SOAP messages which were accepted by the control interface because application signature verification and XML interpretation were handled separately.

Full compromise required knowledge of a signed SOAP message while a single arbitrary cloud control operation could be executed with knowledge of a public X.509 certificate.

Researchers also discovered that since the Amazon shop and EC2 and S3 shared the same log-in credentials, XSS attacks launched against the complex and therefore more vulnerable shop also worked against EC2 and S3.

Similar injection attacks also worked against the Eucalyptus cloud computer software.

Amazon confirmed the attacks and closed the security holes prior to disclosure, according to Professor Jörg Schwenk, chair of network and data security at the university.

The vulnerabilities were detailed at the US-based ACM Cloud Computing Security Workshop and first reported by H-Security.

"A major challenge for cloud providers is that of the data entrusted to them, only the client should be accessible," said Professor Pan who led the team which discovered the holes.

Researcher Juraj Somorovsky said security issues such as the ones detailed in cloud computing must be assessed as the service become more popular.

"Critical infrastructure and services are making ever more use of cloud computing," he said. "It is therefore an urgent need to identify the security gaps in cloud computing".

The university cited “industry estimates’ that European cloud services will more than double from 68 billion euros last year to 148 billion in 2014.

Copyright © SC Magazine, Australia

Amazon's EC2, Eucalyptus hacked
Top Stories
Myer CIO named retailer's new chief executive
Richard Umbers to lead data-driven retail strategy.
Empty terminals and mountains of data
Qantas CIO Luc Hennekens says no-one is safe from digital disruption.
BoQ takes $10m hit on Salesforce CRM
Regulatory hurdles end cloud pilot.
Sign up to receive iTnews email bulletins
Latest Comments
Who do you trust most to protect your private data?

   |   View results
Your bank
Your insurance company
A technology company (Google, Facebook et al)
Your telco, ISP or utility
A retailer (Coles, Woolworths et al)
A Federal Government agency (ATO, Centrelink etc)
An Australian law enforcement agency (AFP, ASIO et al)
A State Government agency (Health dept, etc)

Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
I DON'T support shutting the OAIC.