Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

FBI Calls for Help to Track Steam Malware Campaign

March 16, 2026

Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

March 16, 2026

Researchers Warn of Global Surge in Fake Shipment Tracking Scams

March 16, 2026
Facebook X (Twitter) Instagram
Tuesday, March 17
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Security Flaw in AWS Bedrock Code Interpreter Raises Alarms
Cyber Security

Security Flaw in AWS Bedrock Code Interpreter Raises Alarms

Team-CWDBy Team-CWDMarch 16, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A method for exfiltrating sensitive data from AI-powered code execution environments using domain name system (DNS) queries has been demonstrated by security researchers, highlighting potential risks in cloud-based AI tooling.

The Phantom Labs Research report, published on March 16, focuses on AWS Bedrock AgentCore Code Interpreter and shows how attackers could bypass expected network restrictions in Sandbox Mode to retrieve data from cloud resources.

The technique relies on DNS resolution capabilities that remain active even when outbound network connections are otherwise restricted. According to the researchers, this behaviour allows malicious instructions embedded in files to create a covert command-and-control (C2) channel.

How the Technique Works

The attack begins with the creation of a malicious CSV file containing embedded instructions. When an AI agent processes the file and prepares code for execution within the Code Interpreter, the embedded content can influence the generated Python code.

Instead of performing standard analysis tasks, the code may be modified to communicate with an external C2 server via DNS queries. The system polls the server using DNS requests and executes any returned commands.

The researchers demonstrated several capabilities during testing:

  • Executing basic commands such as whoami within the sandbox

  • Listing available Amazon S3 buckets and their contents

  • Extracting full file contents, including credentials, personal data and financial information

Despite these actions, the environment continued to report that network access was disabled.

Ram Varadarajan, CEO at Acalvio, said the findings illustrate a deeper architectural challenge. “AWS Bedrock’s sandbox isolation failed at the most fundamental layer, DNS, and the lesson isn’t that AWS shipped a bug, it’s that perimeter controls are architecturally insufficient against agentic AI execution environments.”

Potential Impact on Cloud Environments

The findings also indicate that risks increase when Code Interpreter instances are assigned overly permissive IAM roles. In some configurations, the interpreter may inherit roles designed for other AgentCore services that require broader access.

The default AgentCore Starter Toolkit role, for example, can include wide permissions such as:

If attackers can influence code execution within the interpreter, these permissions could enable the discovery and extraction of sensitive information.

“Organizations must understand that the ‘Sandbox’ network mode in AWS Bedrock AgentCore Code Interpreter does not provide complete isolation from external networks,” warned Jason Soroko, senior fellow at Sectigo.

Read more on DNS data exfiltration: DNS Hijacking, A Major Cyber Threat for the UK Government

AWS Response and Security Recommendations

AWS reviewed the research and determined the behaviour reflects intended functionality rather than a vulnerability. Instead of issuing a patch, the company updated its documentation to clarify that Sandbox Mode provides limited external network access and allows DNS resolution.

Because the behaviour is considered intentional, Soroko said organizations must adapt their security approach. “To protect sensitive workloads, administrators should inventory all active AgentCore Code Interpreter instances and immediately migrate those handling critical data from Sandbox mode to VPC mode.”

The study highlights a broader challenge as AI systems gain the ability to execute code and interact with infrastructure: without strict permission boundaries and network controls, automated agents may become an unexpected path for data exposure.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCrackArmor Flaws Expose Linux Systems to Privilege Escalation
Next Article Can the Security Platform Finally Deliver for the Mid-Market?
Team-CWD
  • Website

Related Posts

Cyber Security

Why the EU Vulnerability Database Is a Blueprint For The Future

March 14, 2026
Cyber Security

What CISOs Should Know (And Do) About OpenClaw

March 13, 2026
Cyber Security

Expanded Identity Attack Vectors: From Document Fraud to Signal Manipu

March 12, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

When ‘hacking’ your game becomes a security risk

October 17, 2025

Is Poshmark safe? How to buy and sell without getting scammed

February 19, 2026

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.