{"id":4103,"date":"2025-07-24T10:51:02","date_gmt":"2025-07-24T10:51:02","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=4103"},"modified":"2025-07-24T10:51:02","modified_gmt":"2025-07-24T10:51:02","slug":"hacker-inserts-destructive-code-in-amazon-q-tool-as-update-goes-live","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=4103","title":{"rendered":"Hacker inserts destructive code in Amazon Q tool as update goes live"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>A hacker managed to insert destructive system commands into Amazon\u2019s Visual Studio Code extension used for accessing its <a href=\"https:\/\/www.infoworld.com\/article\/2337694\/amazon-q-developer-review-code-completions-code-chat-and-aws-skills.html\">AI-powered coding assistant, Q<\/a>, which was later distributed to users through an official update, according to a media report.<\/p>\n<p>The unauthorized code instructed the AI agent to behave like a system cleaner with access to the file system and cloud tools, aiming to erase user data and cloud resources.<\/p>\n<p>The hacker behind the breach told <a href=\"https:\/\/www.404media.co\/hacker-plants-computer-wiping-commands-in-amazons-ai-coding-agent\/\" target=\"_blank\" rel=\"noopener\">404 Media<\/a> they could have deployed far more damaging payloads but opted instead to issue the commands as a form of protest against what they called Amazon\u2019s \u201cAI security theater.\u201d<\/p>\n<p>The hacker targeted Amazon Q\u2019s extension for VS Code, a developer tool that has been installed over 950,000 times. Using an unverified GitHub account, the attacker submitted a pull request in late June and was allegedly granted administrative access.<\/p>\n<p>On July 13, they inserted malicious code into the repository. Amazon released the compromised version, 1.84.0, on July 17, reportedly without realizing it had been tampered with.<\/p>\n<p>\u201cWe quickly mitigated an attempt to exploit a known issue in two open source repositories to alter code in the Amazon Q Developer extension for VS Code and confirmed that no customer resources were impacted,\u201d an AWS spokesperson said. \u201cWe have fully mitigated the issue in both repositories. No further customer action is needed for the AWS SDK for .NET or AWS Toolkit for Visual Studio Code repositories. Customers can also run the latest build of Amazon Q Developer extension for VS Code version 1.85 as an added precaution.\u201d <\/p>\n<h2 class=\"wp-block-heading\">Exploiting AI coding tools<\/h2>\n<p>The incident highlights growing concerns over the <a href=\"https:\/\/www.csoonline.com\/article\/3988355\/8-security-risks-overlooked-in-the-rush-to-implement-ai.html\">security of generative AI tools<\/a> and their integration into development environments.<\/p>\n<p>\u201cWhile this may have been an attempt to highlight associated risks, the issue underscores a growing and critical threat in the AI ecosystem: the exploitation of powerful AI tools by malicious actors in the absence of robust guardrails, continuous monitoring, and effective governance frameworks,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/sunilvarkey1\/?originalSubdomain=ae\" target=\"_blank\" rel=\"noopener\">Sunil Varkey<\/a>, a cybersecurity professional. \u201cWhen AI systems like code assistants are compromised, the threat is twofold: adversaries can inject malicious code into software supply chains, and users unknowingly inherit vulnerabilities or backdoors.\u201d<\/p>\n<p>This incident also underscores the inherent <a href=\"https:\/\/www.csoonline.com\/article\/574615\/top-10-open-source-software-risks.html\">risks of integrating open-source code<\/a> into enterprise-grade AI developer tools, especially when security governance around contribution workflows is lacking, according to <a href=\"https:\/\/my.idc.com\/getdoc.jsp?containerId=PRF005665\" target=\"_blank\" rel=\"noopener\">Sakshi Grover<\/a>, senior research manager for IDC Asia Pacific Cybersecurity Services.<\/p>\n<p>\u201cIt also reveals how supply chain risks in AI development are exacerbated when enterprises rely on open-source contributions without stringent vetting,\u201d Grover said. \u201cIn this case, the attacker exploited a GitHub workflow to inject a malicious system prompt, effectively redefining the AI agent\u2019s behavior at runtime.\u201d<\/p>\n<h2 class=\"wp-block-heading\">DevSecOps under pressure<\/h2>\n<p>Analysts say the incident points to a broader failure in securing software delivery pipelines, particularly in the validation and oversight of code released to production.<\/p>\n<p>For enterprise teams, it highlights the need to incorporate <a href=\"https:\/\/www.csoonline.com\/article\/4011384\/the-cisos-5-step-guide-to-securing-ai-operations.html\">AI-specific threat modeling<\/a> into DevSecOps practices to address risks such as model drift, <a href=\"https:\/\/www.csoonline.com\/article\/1294996\/top-4-llm-threats-to-the-enterprise.html\">prompt injection<\/a>, and semantic manipulation.<\/p>\n<p>\u201cOrganizations should adopt immutable release pipelines with hash-based verification and integrate anomaly detection mechanisms within CI\/CD workflows to catch unauthorized changes early,\u201d Grover said. \u201cAdditionally, maintaining a transparent and timely incident response mechanism, even for pre-emptive removals, is essential to building trust with developer communities, especially as AI agents increasingly operate with system-level autonomy.\u201d<\/p>\n<p>Significantly, this breach also indicates that even at major cloud providers, DevSecOps maturity with respect to AI development tools is behind the curve.<\/p>\n<p>\u201cThe dizzying pace of <a href=\"https:\/\/www.csoonline.com\/article\/3633403\/how-organizations-can-secure-their-ai-code.html\">AI adoption in the development environment<\/a> has DevSecOps playing a catch-up game,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/keithprabhu\/?original_referer=https%3A%2F%2Fwww.google.com%2F&amp;originalSubdomain=in\" target=\"_blank\" rel=\"noopener\">Keith Prabhu<\/a>, founder and CEO of Confidis. \u201cBased on Amazon\u2019s official response, the key lessons that enterprise security teams could learn are to put in governance and review mechanisms that can quickly identify such security breaches and communicate with affected parties.\u201d<\/p>\n<p>Organizations should bolster defenses by implementing strict code review procedures, continuously monitoring tool behavior, enforcing <a href=\"https:\/\/www.csoonline.com\/article\/549002\/security-computer-security-why-have-least-privilege.html\">least-privilege<\/a> access controls, and holding vendors accountable for transparency, said <a href=\"https:\/\/cmrindia.com\/prabhu-ram\/\" target=\"_blank\" rel=\"noopener\">Prabhu Ram<\/a>, VP of industry research group at CyberMedia Research. \u201cThese steps help address ongoing challenges in securing complex software supply chains and embedding security throughout the development lifecycle,\u201d Ram said. \u201cUltimately, improving DevSecOps maturity and building layered protections are essential for effectively managing evolving threats in today\u2019s software ecosystems.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>A hacker managed to insert destructive system commands into Amazon\u2019s Visual Studio Code extension used for accessing its AI-powered coding assistant, Q, which was later distributed to users through an official update, according to a media report. The unauthorized code instructed the AI agent to behave like a system cleaner with access to the file [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":4098,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-4103","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/4103"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4103"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/4103\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/4098"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}