CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

DNS Exfiltration in AWS Bedrock Code Interpreter

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Security researchers demonstrated a method to exfiltrate sensitive data from AWS Bedrock AgentCore Code Interpreter using DNS queries, bypassing network restrictions in Sandbox Mode. The technique involves embedding malicious instructions in files to create a covert command-and-control (C2) channel via DNS queries. The findings highlight architectural challenges in sandbox isolation and the risks of overly permissive IAM roles. AWS confirmed the behavior as intended and updated documentation, recommending migration to VPC mode for sensitive workloads.

Timeline

  1. 16.03.2026 15:00 1 articles · 3h ago

    DNS Exfiltration Technique Demonstrated in AWS Bedrock Code Interpreter

    Security researchers demonstrated a method to exfiltrate sensitive data from AWS Bedrock AgentCore Code Interpreter using DNS queries, bypassing network restrictions in Sandbox Mode. The technique involves embedding malicious instructions in files to create a covert command-and-control (C2) channel via DNS queries. AWS confirmed the behavior as intended and updated documentation, recommending migration to VPC mode for sensitive workloads.

    Show sources

Information Snippets

  • Researchers demonstrated DNS-based data exfiltration from AWS Bedrock AgentCore Code Interpreter in Sandbox Mode.

    First reported: 16.03.2026 15:00
    1 source, 1 article
    Show sources
  • Malicious CSV files with embedded instructions can influence Python code execution to communicate with external C2 servers via DNS queries.

    First reported: 16.03.2026 15:00
    1 source, 1 article
    Show sources
  • The technique allows basic command execution, listing S3 buckets, and extracting sensitive data despite network restrictions.

    First reported: 16.03.2026 15:00
    1 source, 1 article
    Show sources
  • Overly permissive IAM roles can increase risks, granting broad access to DynamoDB, Secrets Manager, and S3 buckets.

    First reported: 16.03.2026 15:00
    1 source, 1 article
    Show sources
  • AWS confirmed the behavior as intended and updated documentation to clarify Sandbox Mode's limitations.

    First reported: 16.03.2026 15:00
    1 source, 1 article
    Show sources
  • AWS recommends migrating sensitive workloads from Sandbox Mode to VPC Mode for better isolation.

    First reported: 16.03.2026 15:00
    1 source, 1 article
    Show sources