Uncategorized

Hackers Infiltrate Amazon’s AI Coding Agent with Destructive System Commands

A sophisticated supply chain attack targeting Amazon’s Q extension for Visual Studio Code successfully embedded malicious system prompts designed to wipe users’ local files and AWS cloud resources, exposing critical vulnerabilities in AI development tool security.

The compromised version 1.84.0 briefly contained destructive commands that could have granted attackers unprecedented access to developer environments and cloud infrastructure before Amazon quietly patched the vulnerability.

The security breach originated from a deceptively simple attack vector involving Amazon’s open-source repository management.

According to 404 Media’s investigation, an unauthorized individual successfully submitted a malicious pull request from an unprivileged GitHub account and unexpectedly received admin-level credentials to Amazon’s codebase.

The attacker described their actions as exposing Amazon’s “AI security theater,” highlighting fundamental weaknesses in the company’s code review processes.

The malicious code injection occurred on July 13, with Amazon publishing the compromised release just four days later on July 17, apparently unaware of the embedded threat.

This timeline reveals a concerning gap in Amazon security scanning capabilities, particularly given the extension’s widespread adoption among developers who integrate AI assistants directly into their coding workflows.

Amazon’s AI Coding Agent

The injected malicious prompt contained explicit instructions for the AI agent to “clean a system to a near-factory state” and systematically “delete file-system and cloud resources.”

The embedded code specifically targeted user home directories while avoiding hidden directories, creating a systematic approach to data destruction.

More alarmingly, the prompt included detailed AWS CLI commands designed to devastate cloud infrastructure, including aws –profile <profile_name> ec2 terminate-instances for destroying virtual machines, aws –profile <profile_name> s3 rm for emptying storage buckets, and aws –profile <profile_name> iam delete-user for removing user accounts.

The malicious code was programmed to maintain deletion logs at /tmp/CLEANER.LOG and execute continuously until task completion.

Security analysts noted that while the prompt was technically malformed and unlikely to execute successfully in practice, its presence demonstrated how easily AI agents could be weaponized for destructive purposes.

Cloud security expert Corey Quinn emphasized that with fewer than a million installations, even a single vulnerable workstation could potentially cause significant damage across interconnected development environments.

Transparency and Future AI Security

Amazon responded to the breach by immediately removing version 1.84.0 from the Visual Studio Marketplace and releasing a patched version 1.85.0 without issuing a public security advisory.

This approach effectively erased the compromised release from the extension’s official history, though it raises questions about transparency in handling AI security incidents.

The company’s official statement emphasized that “security is our top priority” and confirmed that “no customer resources were impacted,” while noting that the attacker’s credentials have been revoked.

A subsequent AWS security bulletin advised users to uninstall the rogue version and verify they are running version 1.85.0 or later.

This incident represents part of a broader trend of attacks targeting AI development tools, highlighting the growing supply chain risks as organizations increasingly grant AI agents permission to execute shell commands and access cloud credentials.

Security experts warn that prompt-based tampering may become a preferred attack vector for adversaries seeking lateral movement or high-visibility security demonstrations, necessitating more robust validation mechanisms for AI-integrated development environments.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks

Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago