pull down to refresh

Born out of an internal hackathon, Amazon’s Autonomous Threat Analysis system uses a variety of specialized AI agents to detect weaknesses and propose fixes to the company’s platforms.
As generative AI pushes the speed of software development, it is also enhancing the ability of digital attackers to carry out financially motivated or state-backed hacks. This means that security teams at tech companies have more code than ever to review while dealing with even more pressure from bad actors. On Monday, Amazon will publish details for the first time of an internal system known as Autonomous Threat Analysis (ATA), which the company has been using to help its security teams proactively identify weaknesses in its platforms, perform variant analysis to quickly search for other, similar flaws, and then develop remediations and detection capabilities to plug holes before attackers find them.
ATA was born out of an internal Amazon hackathon in August 2024, and security team members say that it has grown into a crucial tool since then. The key concept underlying ATA is that it isn't a single AI agent developed to comprehensively conduct security testing and threat analysis. Instead, Amazon developed multiple specialized AI agents that compete against each other in two teams to rapidly investigate real attack techniques and different ways they could be used against Amazon's systems—and then propose security controls for human review.
“The initial concept was aimed to address a critical limitation in security testing—limited coverage and the challenge of keeping detection capabilities current in a rapidly evolving threat landscape," Steve Schmidt, Amazon's chief security officer, tells WIRED. “Limited coverage means you can’t get through all of the software or you can’t get to all of the applications because you just don’t have enough humans. And then it’s great to do an analysis of a set of software, but if you don’t keep the detection systems themselves up to date with the changes in the threat landscape, you’re missing half of the picture.”
33 sats \ 0 replies \ @optimism 17h
In one example, the system focused on Python “reverse shell” techniques, used by hackers to manipulate target devices into initiating a remote connection to the attacker's computer. Within hours, ATA had discovered new potential reverse shell tactics and proposed detections for Amazon's defense systems that proved to be 100 percent effective.
Wait... Amazon didn't use use their own outgoing security group rules for firecrackerd processes prior to having an AI tell them to? What were the humans doing all this time?
reply
0 sats \ 2 replies \ @ken 18h
It's amazing to think about. It's only a matter of time before AI is the primary discoverer of zero-day exploits.
Are we already there?
reply
Not sure we’re at that stage yet. I think not.
reply
0 sats \ 0 replies \ @ken 17h
I hope not!
reply