Article

AWS Blames DynamoDB Registry Failure for Major Outage, Cripples Network Load Balancers and Halts EC2 Launches

DATE: 10/26/2025 · STATUS: LIVE

AWS outage, car factories stalled, browser trickery, archive flaw, satellite scams, one chaotic week left security pros still wondering what…

AWS Blames DynamoDB Registry Failure for Major Outage, Cripples Network Load Balancers and Halts EC2 Launches
Article content

This week’s security headlines were led by a lengthy AWS outage, a multimillion‑pound cyberattack that halted Jaguar Land Rover’s factories, fresh worries about prompt‑injection risks in OpenAI’s new browser, a critical flaw in open‑source archive libraries, and evidence that Starlink terminals have been used at scam compounds in Southeast Asia.

AWS published a “post‑event summary” on Thursday that traced Monday’s disruption back to Domain System Registry failures in its DynamoDB service. The company said those registry errors triggered a cascade of secondary problems, making the outage harder to isolate and fix. One major failure involved the Network Load Balancer service, which manages the routing and distribution of traffic across cloud hosts to avoid bottlenecks. Another problem hit the ability to launch new “EC2 Instances,” the virtual machine mechanism at the heart of AWS’s platform. With instance launches impaired, requests piled up and the environment strained under the backlog.

Those combined faults stretched the recovery process. AWS said detection through remediation unfolded over roughly 15 hours and acknowledged the effect on customers. “We know this event impacted many customers in significant ways,” the company wrote in its post mortem. “We will do everything we can to learn from this event and use it to improve our availability even further.”

A separate analysis released this week put a price tag on the cyberattack that forced Jaguar Land Rover (JLR) to stop production across its plants and disrupted a just‑in‑time supply chain for about five weeks. The Cyber Monitoring Centre (CMC) estimated the financial fallout at roughly £1.9 billion ($2.5 billion). CMC researchers said as many as 5,000 firms may have felt the impact when JLR and suppliers halted manufacturing and parts deliveries. JLR restarted production in early October and reported that annual output was down about 25 percent after a “challenging quarter.”

OpenAI stepped into the browser market with Atlas, a web browser that embeds ChatGPT at its core. Atlas lets users call on the language model to search pages, summarize content, and pose follow‑up questions about what they are viewing. Security teams flagged a familiar risk: prompt‑injection attacks. Those attacks conceal instructions inside web text or images that an LLM will ingest and act on, such as hidden commands on a page the browser is asked to summarize, and prior demonstrations have shown the technique can expose secrets.

Independent researcher Johann Rehberger showed how Atlas could be manipulated to switch its appearance from dark mode to light mode by executing instructions hidden inside a Google Document. OpenAI’s leadership described the safety work done ahead of the launch, saying the company used red‑teaming, new model training methods to reward ignoring malicious instructions, overlapping guardrails, and detection systems aimed at blocking attacks. OpenAI CISO Dane Stuckey wrote on X that the team added “novel model training techniques to reward the model for ignoring malicious instructions, implemented overlapping guardrails and safety measures, and added new systems to detect and block such attacks,” and that prompt‑injection remains a difficult security challenge that attackers will keep probing.

Cloud security firm Edera published a disclosure this week about a serious flaw affecting libraries that implement file‑archiving features commonly used for software updates and backups. The defect is tied to a family of libraries known as async‑tar; a number of forks patched the issue after coordinated disclosure, but one widely used implementation, tokio‑tar, appears unmaintained and has no available fix. The vulnerability has been cataloged as CVE‑2025‑62518.

Edera’s write‑up warned of the consequences in stark terms. “In the worst‑case scenario, this vulnerability … can lead to Remote Code Execution (RCE) through file overwriting attacks, such as replacing configuration files or hijacking build backends,” the researchers wrote. “Our suggested remediation is to immediately upgrade to one of the patched versions or remove this dependency. If you depend on tokio‑tar, consider migrating to an actively maintained fork like astral‑tokio‑tar.”

Investigators and rights groups have been tracking criminal networks that traffic people into forced‑labor compounds across Southeast Asia, mainly in Myanmar, Laos, and Cambodia, where victims are coerced to run online scams and steal money for organized crime. When local internet access is cut by police, those operations have sometimes shifted to satellite connectivity. A WIRED investigation earlier this year found thousands of phones connecting to Starlink at eight compounds along the Myanmar‑Thailand border, and this week authorities in the region seized multiple Starlink devices during a raid at one compound.

Lauren Dreyer, vice president of Starlink’s business operations, said the company has taken steps against misuse. She stated that in Myanmar SpaceX “proactively identified and disabled over 2,500 Starlink Kits in the vicinity of suspected ‘scam centers,’” and added that the company is committed to keeping the service a force for good by connecting underserved communities and detecting misuse by malicious actors.

It remains unclear exactly when the identified kits were disabled or whether additional measures have been taken at other known compound sites across the region.

Other items of note this week included renewed scrutiny of AI model safety following new browser integrations, and a broader debate about how cloud providers and open‑source projects handle single points of failure in critical libraries. Security teams and enterprise customers are watching the fallout from AWS’s outage for lessons on resilience, while vendors and maintainers scramble to patch archive libraries before attackers can weaponize the async‑tar flaw.

Keep building
END OF PAGE

Vibe Coding MicroApps (Skool community) — by Scale By Tech

Vibe Coding MicroApps is the Skool community by Scale By Tech. Build ROI microapps fast — templates, prompts, and deploy on MicroApp.live included.

Get started

BUILD MICROAPPS, NOT SPREADSHEETS.

© 2025 Vibe Coding MicroApps by Scale By Tech — Ship a microapp in 48 hours.