Leaking your AWS API keys, on purpose? [Research Saturday]
Apr 6, 2024
auto_awesome
Noah Pack, a SANS Intern, discusses leaking AWS API keys intentionally for research. He shares insights on responses from different automated processes and security services. The aftermath of publicly revealing AWS API keys and the alerts triggered by GitGuardian, AWS, and suspicious IP addresses are highlighted. Implications of accidental leaks and risk mitigation strategies are explored, emphasizing the need for immediate action and key rotation.
Accidentally leaking AWS API keys can result in immediate exploitation by threat actors, as demonstrated by Noah Pack's experience with exposing email credentials on GitHub.
Utilizing Canary Tokens can help in detecting unauthorized access, acting as honeypots that notify creators when triggered and providing valuable information to mitigate risks of exposing sensitive information.
Deep dives
Risks of Accidentally Sharing API Keys
Accidentally sharing AWS API keys can lead to immediate exploitation by threat actors. Noah Pack, an intern with the SANS Internet Storm Center, shared his experience when he posted code containing hardcoded email credentials on GitHub. Instantly, his email account was bombarded with login attempts, highlighting the risks of exposing sensitive information.
Canary Tokens for Security Testing
Noah Pack discussed the concept of Canary Tokens as a means to detect unauthorized access. These tokens, acting like honeypots, alert the creator when triggered, providing valuable information such as IP addresses and user agents. By embedding AWS API key Canary Tokens in a small e-commerce website, Noah observed attempts to exploit the exposed credentials.
Mitigation Strategies for API Key Exposure
The importance of promptly rotating exposed API keys for security is emphasized. Noah Pack underscored the critical need to mitigate risks associated with leaked credentials by creating new keys with restricted permissions. Additionally, secure coding practices and continuous monitoring, such as analyzing cloud trail logs and setting up alerts, are highlighted to prevent unauthorized access and protect sensitive data.
Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him.
The research states "In this article, I will share some research, resources, and real-world data related to leaked AWS API keys." In this research, Noah shares what he learned while implementing his experiment.