My AWS Account Got Hacked - Here Is What Happened

This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).

A cloud architect shares a detailed account of how their personal AWS account was compromised through an exposed access key in a NextJS application. The attacker created IAM users, launched EC2 instances for crypto-mining, flooded the victim's inbox with spam to hide AWS notifications, and attempted to use SES for phishing. The post walks through the detection process, containment steps, timeline reconstruction using CloudTrail, and root cause analysis. Key lessons include proper secret management, enabling GuardDuty, avoiding root user access, and responding quickly to suspicious activity.

15m read timeFrom zviwex.com
Post cover image
Table of contents
2-3 hours before realizing1 hour before realizingRealizing!First 1-2 hours - understanding the severityHour 3 - Incident analysisHour 4 - finding the breachSummary - Chronological attack flowWho is the attacker? What was their purpose?InsightsEpilogue
3 Comments

Sort: