HomeRisk ManagementsLLMjacking: Utilizing stolen AWS credentials to enable LLMs and increase expenses for...

LLMjacking: Utilizing stolen AWS credentials to enable LLMs and increase expenses for victims

Published on

spot_img

In a recent analysis of API actions called by attackers using compromised credentials, it was found that InvokeModel, InvokeModelStream, Converse, and ConverseStream were the most commonly used actions earlier this year. However, new observations have shown that attackers are now also utilizing PutFoundationModelEntitlement, PutUseCaseForModelAccess, ListFoundationModels, and GetFoundationModelAvailability to enable and detect access to models in advance.

This development has raised concerns for organizations that have deployed Bedrock but have not activated certain models, as they may still be vulnerable to attacks. The cost implications of different models can vary significantly, with potential daily costs reaching over $46,000 for models like Claude 2.x. On the other hand, models such as Claude 3 Opus could cost two to three times more, making it crucial for organizations to closely monitor and manage model access.

One particularly concerning trend identified by researchers is the use of Claude 3 by attackers to generate and enhance code for a script that interacts with the model. This script is designed to continuously engage with the model, generate responses, monitor for specific content, and store the results in text files.

The evolving tactics of attackers highlight the importance of robust security measures and vigilant monitoring to safeguard against unauthorized access and misuse of models. As the cost of potential damages could be substantial, organizations must prioritize security protocols and regularly update their defenses to stay ahead of emerging threats.

Overall, the insights gained from the analysis underscore the growing sophistication of cyber threats targeting API actions and the critical need for proactive measures to protect sensitive data and assets. By staying informed and implementing best practices in cybersecurity, organizations can mitigate risks and maintain a secure environment for their operations.

Source link

Latest articles

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

More like this

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...