Security

Cyber-crime

AWS stirs the MadPot – busting bot baddies and eastern espionage

Security exec Mark Ryland spills the tea on hush-hush threat intel tool


Interview AWS has unveiled MadPot, its previously secret threat-intelligence tool that one of the cloud giant's security execs tells us has thwarted Chinese and Russian spies – and millions of bots.

The massive honeypot system has been around since late last decade, and includes tens of thousands of threat sensors monitoring criminals' attempts to connect with AWS decoys. These sensors spot more than 100 million potential threats every day, and some 500,000 of these turn out to be malicious activity, according to the cloud giant.

Even though it's been under development and in use for years, AWS just this week went public with details about MadPot and some of the attacks it has thwarted.

This includes preventing Chinese spies from snooping around in US critical infrastructure networks earlier this year and contributing to the Five Eyes' May advisory about Volt Typhoon, a Beijing-backed cyber-espionage gang.  

Using data gleaned from MadPot, Amazon was able to identify a payload that contained a unique signature, and then determined that as belonging to Volt Typhoon.

"We do keep a huge security data lake of all the past interactions" with MadPot, Mark Ryland, director of the Office of the CISO for AWS, told The Register. This data lake allowed the threat hunters to identify other instances of the Chinese hackers' signature going back to August 2021.

"The success story there was being able to do the query across a large data set going back multiple years, for these sort of subtle indicators of identity, something that's unique about the behavior," Ryland said.

AWS still sees Volt Typhoon trying to break into US networks, and continues sharing this information with the government.

Spotting Sandworm

Sandworm also got caught in AWS's decoys when it tried to exploit what it thought was a WatchGuard network security appliance. In 2022, the hacking crew, tied to Russia's GRU military intelligence unit, went on a hijacking spree, compromising WatchGuard and ASUS routers to run its Cyclops Blinks botnet in an attempt to use these devices as command-and-control (C2) servers for future attacks. The feds took down the C2 infrastructure in April 2022.

Using MadPot's intel, AWS identified the IP addresses and other attributes tied to Sandworm being used in attempts to compromise one of its customers. Ryland says the cloud provider notified the customer, which then mitigated the vulnerability and prevented a device takeover.

This illustrates how MadPot can detect and help prevent attacks that aren't typically cloud threats, according to Ryland.

"We emulate things like home routers or security appliances that normally aren't in the cloud," he said. "We're constantly expanding the kinds of behaviors we can emulate, and thereby gain greater intelligence as to what's going on with the malicious actors."

AWS claims that, in the first three months of 2023, MadPot thwarted more than 1.3 million outbound botnet-driven distributed denial-of-service attacks. And in the first half of the year, it spotted almost 2,000 botnet C2 hosts, and shared these details with relevant hosting providers and domain registrars to take down the control infrastructure.

"We now have very quick and accurate capability to detect C2 behavior that allows us to block C2 signals at the edge of our network, which has a huge impact across our large IP space," Ryland said. "That ability to shut it off at the spigot, or at least as it enters our network, is one of the most important advances that we've been able to make."

Like everyone else keeping a close eye on the threat landscape, AWS has seen a massive influx in the number of network-flooding DDoS attempts. The cloud giant has also seen a spike in these attacks at the application layer, according to Ryland.

During the first six months of 2023, AWS worked with other providers to shut down the sources of about 230,000 of these Layer 7 DDoS events.

"That's an area that we've seen a significant increase," Ryland said. "We were able to do a lot of detection and edge blocking of that, but also working to drive down the existence of open proxies across our platform , [and]... the broader internet by letting other providers know when we see that behavior."

Another element of these open proxies is that criminals like to use them for credential-stuffing attacks, where they've obtained a list of leaked or stolen passwords, and then try to brute-force their way into a victim's environment.

MadPot, "by pretending to be an open proxy and pretending to send the requests on to the actual target," gives AWS a ton of data about these attempts, and helps prevent more people and organizations from falling victim to them, Ryland said. 

"We know not only who the target is, we know exactly what they're targeting, who they're targeting," he said. "And we can actually then acquire all the credentials that they're using and add those to industry lists of known stolen credentials." ®

Send us news
5 Comments

AWS exec: 'Our understanding of open source has started to change'

Apache Foundation president David Nalley on Amazon Linux 2023, Free software, and more

AWS accuses Microsoft of clipping customers' cloud freedoms

World's biggest off-prem service slinger submits comments to UK cloud inquiry, mostly has Redmond HQ's rival in its sights

The AI everything show continues at AWS: Generate SQL from text, vector search, and more

Invisible watermarks on AI-generated images? Sure. But major tools in the stack matter most

Five Eyes nations warn Moscow's mates at the Star Blizzard gang have new phishing targets

The Russians are coming! Err, they've already infiltrated UK, US inboxes

AWS unveils core-packed Graviton4 and beefier Trainium accelerators for AI

Also hedging its bets with a healthy dose of Nvidia chips too

Watchdog claims retaliation from military after questioning cushy federal IT contracts

IT-AAC had a hand in scrutinizing JEDI, now faces probe for challenging $300M+ single-source deals

Now AWS gets a ChatGPT-style Copilot: Amazon Q to be your cloud chat assistant

Anthropic CEO also rocks up on stage for reasons

AWS previews AppFabric for productivity – pitched as AI-powered glue between apps

Park user data in Amazon's servers for ML-generated insights and actions – yea or nay for you?

AWS plays with Fire TV Cube, turns it into a thin client for cloudy desktops

$195 a pop, delivered, pre-provisioned ready to stream desktops or apps

You're so worried about AWS reliability, the cloud giant now lets you simulate major outages

Fake it 'til you break it, for a whole availability zone or WAN FAIL

BlackBerry squashes plan to spin out its IoT biz

Board and incoming CEO decide reorganizing is better than splitting

Dump C++ and in Rust you should trust, Five Eyes agencies urge

Memory safety vulnerabilities need to be crushed with better code