Posted in

3 Ways New Langflow Hack Steals Your AWS Cloud Keys

In a chilling demonstration of how AI convenience can compromise cloud security, attackers are now actively exploiting CVE-2026-33017—a critical vulnerability in Langflow. By targeting this open-source AI orchestration tool, threat actors are bypasssing logins to steal AWS access keys and conscripting servers into a sophisticated new botnet.

First added to the CISA KEV catalog in March 2026, this unauthenticated remote code execution (RCE) flaw has become a “golden ticket” for hackers looking to fund their operations through “LLM-jacking” and credential theft.


How the Attack Works: From API to AWS

Researchers from Sysdig recently tracked a campaign where an attacker gained full control of a Langflow instance in under 30 minutes.

The Attack Chain:

  1. The Entry: The attacker hits a public, unauthenticated endpoint (/api/v1/build_public_tmp/) to execute commands directly within the Langflow container.
  2. The Heist: Using simple environment commands, the attacker dumps sensitive variables, instantly exposing AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY.
  3. The Pivot: With keys in hand, the attacker performs a “cloud sweep,” enumerating S3 buckets and EC2 instances before moving to AWS Bedrock to run expensive AI models on the victim’s dime.

“KeyHunter”: The NATS-Powered Botnet

This is more than a simple data breach. Attackers are installing a toolset called KeyHunter to turn compromised hosts into permanent workers.

  • The Malware: A Python-based worker and a Go binary are deployed to systematically scrape the web and cloud sandboxes for even more API keys (OpenAI, Anthropic, etc.).
  • The Command Center: Unlike traditional botnets that use web panels, KeyHunter uses a NATS message broker for command and control (C2). This allows the operator to queue tasks and receive stolen data in real-time through an encrypted, high-speed messaging channel.
  • Persistence: A deployment script ensures the malware runs as a system service, allowing it to survive reboots and maintain a long-term foothold.

Critical Indicators of Compromise (IoCs)

Security teams should immediately monitor for these signals:

  • C2 Server: 45.192.109.25:14222 (NATS Broker)
  • Staging Server: 159.89.205.184:8888 (Malware Hosting)
  • Python Worker (SHA-256): 323bbf3064d4b83df7920d752636b1acb36f462e58609a815bd8084d1e6
  • KeyHunter Activity: Look for unauthorized calls to the sts:GetCallerIdentity AWS API.

How to Protect Your AI Infrastructure

If you are running Langflow, the time to act is now.

  1. Patch Immediately: Update Langflow to the latest version to close the CVE-2026-33017 endpoint.
  2. Rotate All Keys: If your instance was internet-facing, assume it is compromised. Rotate your AWS, OpenAI, and Hugging Face keys immediately.
  3. Restrict Egress: Configure your firewall to ensure AI tools can only talk to known LLM endpoints, blocking outbound traffic to unknown IP addresses or NATS ports (e.g., 14222

Leave a Reply

Your email address will not be published. Required fields are marked *