Summary

Through this exercise, we have taken the steps involved in generating and analyzing the Findings, thereby performing the corresponding Remediation process to solve the problem immediately.

Finding Scenario
UnauthorizedAccess:EC2/MaliciousIPCaller.Custom Compromised EC2 Instance
Recon:IAMUser/MaliciousIPCaller.Custom Compromised IAM credentials
UnauthorizedAccess:IAMUser/MaliciousIPCaller.Custom Compromised IAM credentials
UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration IAM Role credential exfiltration