![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9a8Hm9Uk8c7AJVmW2oF9JjP4pZ6ZuQo1Q8W5x21aT12kqhJilmAcgd6VWyd2-gE3OGwA7cDZh8yapKnyxmhNyCKyvbAyu97syKtENBcUBsCPt2JN6Ua2_VIMCGqaATJFijM7PKHIuQrJXZAExpkCM9uijXVIPYp9G0JIAfl_5CLI5umaOT-5Pzq4t1ptO/s1600/hacking.jpg)
Cybersecurity researchers have discovered a new post-exploitation technique in Amazon Web Services (AWS) that allows the AWS Systems Manager Agent (SSM Agent) to be run as a remote access trojan on Windows and Linux environments
“The SSM agent, a legitimate tool used by admins to manage their instances, can be re-purposed by an attacker who has achieved high privilege access on an endpoint with
Source:: The Hackers News