Rhino Security Labs

Strategic & Technical Blog

Cloud Malware:
Resource Injection in CloudFormation Templates

Ryan Gerstenkorn

As a process, CloudFormation deployments are modular, with the template upload being a distinct step from the deployment itself. Templates can be made through the web console or through 3rd party tools, but as CloudFormation is an AWS-…

CloudGoat ECS_EFS_Attack Walkthrough

GKE Kubelet TLS Bootstrap Privilege Escalation

Weaponizing AWS ECS Task Definitions
to Steal Credentials From Running Containers

Nick Spagnola

Using containers to host applications in cloud environments is an increasingly popular deployment model in AWS. Due to this trend, researchers at Rhino Security Labs explored how these containers can be abused to steal information or…