Phantom DNS Query to GCP VM Metadata Service in My AWS Workload
I Found Suspicious DNS Calls on AWS I was debugging flaky outbound calls from an AWS Fargate task. To gain better visibility into potential network issues, I followed the common best practice of enabling Route 53 Resolver query logging for DNS queries within my VPC on AWS. Shortly after the logs started populating, while examining them for clues related to the original outbound problems, I noticed something odd... I noticed repeated lookups for metadata.google.internal. — an endpoint meant exclusively for Google Cloud VMs, but hey, my workload was on AWS all the time! At first glance, it felt like a hacker reconnaissance probing my AWS Fargate tasks

I Found Suspicious DNS Calls on AWS
I was debugging flaky outbound calls from an AWS Fargate task. To gain better visibility into potential network issues, I followed the common best practice of enabling Route 53 Resolver query logging for DNS queries within my VPC on AWS. Shortly after the logs started populating, while examining them for clues related to the original outbound problems, I noticed something odd...
I noticed repeated lookups for metadata.google.internal.
— an endpoint meant exclusively for Google Cloud VMs, but hey, my workload was on AWS all the time!
At first glance, it felt like a hacker reconnaissance probing my AWS Fargate tasks