frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Ask HN: Our AWS account got compromised after their outage

80•kinj28•2h ago
Could there be any link between the two events?

Here is what happened:

Some 600 instances were spawned within 3 hours before AWS flagged it off and sent us a health event. There were numerous domains verified and we could see SES quota increase request was made.

We are still investigating the vulnerability at our end. our initial suspect list has 2 suspects. api key or console access where MFA wasn’t enabled.

Comments

bdcravens•2h ago
Any chance you did something crazy while troubleshooting downtime (before you knew it was an AWS issue)? I've had to deal with a similar situation, and in my case, I was lazy and pushed a key to a public repo. (Not saying you are, just saying in my case it was a leaked API key)
klysm•2h ago
Sounds like a coincidence to me
yfiapo•1h ago
Highly likely to be coincidence. Typically an exposed access key. Exposed password for non-MFA protected console access happens but is less common.
ThreatSystems•1h ago
Cloudtrail events should be able to demonstrate WHAT created the EC2s. Off the top of my head I think it's the runinstance event.
sylens•1h ago
RunInstances
ThreatSystems•37m ago
I'm officially off of AWS so don't have any consoles to check against, but back on a laptop.

Based on docs and some of the concerns about this happening to someone else, I would probably start with the following:

1. Check who/what created those EC2s[0] using the console to query: eventSource:ec2.amazonaws.com eventName:RunInstances

2. Based on the userIdentity field, query the following actions.

3. Check if someone manually logged into Console (identity dependent) [1]: eventSource:signin.amazonaws.com userIdentity.type:[Root/IAMUser/AssumedRole/FederatedUser/AWSLambda] eventName:ConsoleLogin

4. Check if someone authenticated against Security Token Service (STS) [2]: eventSource:sts.amazonaws.com eventName:GetSessionToken

5. Check if someone used a valid STS Session to AssumeRole: eventSource:sts.amazonaws.com eventName:AssumeRole userIdentity.arn (or other identifier)

6. Check for any new IAM Roles/Accounts made for persistence: eventSource:iam.amazonaws.com (eventName:CreateUser OR eventName:DeleteUser)

7. Check if any already vulnerable IAM Roles/Accounts modified to be more permissive [3]: eventSource:iam.amazonaws.com (eventName:CreateRole OR eventName:DeleteRole OR eventName:AttachRolePolicy OR eventName:DetachRolePolicy)

8. Check for any access keys made [4][5]: eventSource:iam.amazonaws.com (eventName:CreateAccessKey OR eventName:DeleteAccessKey)

9. Check if any production / persistent EC2s have had their IAMInstanceProfile changed, to allow for a backdoor using EC2 permissions from a webshell/backdoor they could have placed on your public facing infra. [6]

etc. etc.

But if you have had a compromise based on initial investigations, probably worth while getting professional support to do a thorough audit of your environment.

[0] https://docs.aws.amazon.com/awscloudtrail/latest/userguide/c...

[1] https://docs.aws.amazon.com/awscloudtrail/latest/userguide/c...

[2] https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-...

[3] https://docs.aws.amazon.com/awscloudtrail/latest/userguide/s...

[4] https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credenti...

[5] https://research.splunk.com/sources/0460f7da-3254-4d90-b8c0-...

[6] https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_R...

sousastep•1h ago
couple folks on reddit said while they were refreshing during the outage, they were briefly logged in as a whole different user
afandian•1h ago
Got references? This is crazy.
__turbobrew__•44m ago
Maybe dynamodb was inconsistent for a period and as that backs IAM credentials were scrambled? Do you have references to this, because if it is true that is really really bad.
CaptainOfCoit•36m ago
> couple folks on reddit said while they were refreshing during the outage, they were briefly logged in as a whole different user

Didn't ChatGPT have a similar issue recently? Would sound awfully similar.

liviux•32m ago
A friend of a friend knows a friend who logged in to Netflix root account. Source: trust me bro
itsnowandnever•1h ago
i cant imagine it's related. if it is related, hello Bloomberg News or whoever will be reading this thread because that would be a catastrophic breach of customer trust that would likely never fully return
jddj•36m ago
You say that, but azure and okta have had a handful of these and life over there has more or less gone on.

Inertia is a hell of a drug

timdev2•1h ago
I would normally say that "That must be a coincidence", but I had a client account compromise as well. And it was very strange:

Client was a small org, and two very old IAM accounts had suddenly had recent (yesterday) console log ins and password changes.

I'm investigating the extent of the compromise, but so far it seems all they did was open a ticket to turn on SES production access and increase the daily email limit to 50k.

These were basically dormant IAM users from more than 5 years ago, and it's certainly odd timing that they'd suddenly pop on this particular day.

tcdent•12m ago
Smells like a phishing attack to me.

Receive an email that says AWS is experiencing an outage. Log into your console to view the status, authenticate through a malicious wrapper, and compromise your account security.

SoftTalker•8m ago
Good point. Phishers would certainly take advantage of a widely reported outage to send emails related to "recovering your services."

Even cautious people are more vulnerable to phishing when the message aligns with their expectations and they are under pressure because services are down.

Always, always log in through bookmarked links or typing them manually. Never use a link in an email unless it's in direct response to something you initiated and even then examine it carefully.

CaptainOfCoit•15m ago
Is it possible that people who already managed to get access (that they confirmed) has been waiting for any hiccups in AWS infrastructure in order to hide among the chaos when it happens? So maybe the access token was exposed weeks/months ago, but instead of going ahead directly, idle until there is something big going on.

Certainly feels like an strategy I'd explore if I was on that side of the aisle.

AtNightWeCode•13m ago
Not uncommon that machines get exposed during trouble-shooting. Just look at the Crowdstrike incident just the other year. People enabled RDP on a lot machines to "implement the fix" and now many of these machines are more vulnerable than if if they never installed that garbage security software in the first place.

Jzb on LWN's 'Vintage' Style

https://hachyderm.io/@jzb/115413478341532720
1•phoronixrly•1m ago•0 comments

Michael Levin – Aging as a Loss of Goal-Directedness

https://advanced.onlinelibrary.wiley.com/doi/10.1002/advs.202509872?af=R
1•myth_drannon•2m ago•0 comments

The Gnome Way

https://blogs.gnome.org/aday/2017/08/08/the-gnome-way/
1•airhangerf15•3m ago•0 comments

My wife gave me 100 days to make it as an indie creator

https://blog.jacobstechtavern.com/p/my-wife-gave-me-100-days
2•jakey_bakey•5m ago•0 comments

Open AI launches browser Vibe Check

https://every.to/vibe-check
1•sam1r•6m ago•2 comments

NAT traversal improvements, pt. 2: Challenges in cloud environments

https://tailscale.com/blog/nat-traversal-improvements-pt-2-cloud-environments
1•CharlesW•7m ago•0 comments

Rare Earths Recovery from Ewaste

https://arstechnica.com/science/2025/10/breaking-down-rare-earth-element-magnets-for-recycling/
1•DaveZale•8m ago•0 comments

AWS outage: Are we relying too much on US big tech?

https://www.bbc.com/news/articles/c0jdgp6n45po
5•devonnull•10m ago•0 comments

Hammurabi Currency Converter

https://justine.lol/inflation/
2•jart•11m ago•0 comments

Use Cursor agent inside any ACP compatible IDE

https://github.com/roshan-c/cursor-acp
1•parting0163•11m ago•0 comments

OpenAI Looks to Replace the Drudgery of Junior Bankers' Workload

https://www.bloomberg.com/news/articles/2025-10-21/openai-looks-to-replace-the-drudgery-of-junior...
1•megacorp•13m ago•0 comments

Show HN: Playbook AI – knowledge base for using AI in product development

https://aidevplaybook.com/en
1•greatgenby•13m ago•0 comments

MIT Maritime Consortium Releases "Nuclear Ship Safety Handbook"

https://news.mit.edu/2025/mit-maritime-consortium-nuclear-ship-safety-handbook-1020
1•gnabgib•13m ago•0 comments

Sora 2 Go – Make pro videos using OpenAI's Sora 2, no invite needed

https://sora2go.lovable.app/
1•vannventures•16m ago•1 comments

The Slack-O-lantern says back to woooOOOoooOOOrk [video]

https://www.youtube.com/shorts/Ouu0oi0mcY4
2•ohjeez•17m ago•0 comments

MinIO Goes Source-Only Distribution

https://github.com/minio/minio/issues/21647
1•tiri•17m ago•1 comments

Do we need to be saying 'please' and 'thanks' to AI?

https://www.rnz.co.nz/life/lifestyle/do-we-need-to-be-saying-please-and-thanks-to-ai
3•billybuckwheat•18m ago•0 comments

Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical

https://eprint.iacr.org/2025/1910
1•nabla9•19m ago•0 comments

OpenAI Is Building a Banker

https://www.bloomberg.com/opinion/newsletters/2025-10-21/openai-is-building-a-banker
1•ioblomov•21m ago•1 comments

Modal editing is a weird historical contingency we have through sheer happensta

https://buttondown.com/hillelwayne/archive/modal-editing-is-a-weird-historical-contingency/
1•todsacerdoti•22m ago•0 comments

Show HN: I scraped 10k+ remote tech jobs into one feed

https://jobdit.co
1•imadbkr•22m ago•0 comments

'Sean Dummy': Musk and Duffy Brawl over the Future of NASA

https://www.politico.com/news/2025/10/21/elon-musk-sean-duffy-nasa-future-00616827
1•JumpCrisscross•22m ago•0 comments

Israeli flag found on hacked Malaysian water company website

https://aseannow.com/topic/1376426-israeli-flag-on-hacked-malaysian-website/
3•jataget•22m ago•0 comments

'It's PR, not the ER': Gen Z is resisting the workplace emergency

https://www.washingtonpost.com/business/2025/10/21/gen-z-workplace-emergencies/
5•nlawalker•23m ago•2 comments

Pixel Art in Microcontroller Displays

https://makapix.club/
1•fabk•23m ago•1 comments

Show HN: Don't Ask Me – An AI that refuses to answer and makes you think

https://dont-ask-me.vercel.app/
2•johnzakkam•24m ago•0 comments

Real-Time Audio Deepfakes Have Arrived

https://spectrum.ieee.org/real-time-audio-deepfake-vishing
4•pseudolus•25m ago•0 comments

Hefesto – ML-powered code quality agent with semantic analysis

https://github.com/artvepa80/Agents-Hefesto
1•artvepa•26m ago•1 comments

Microsoft Exempts Many Salespeople from Return-to-Office Mandate

https://www.bloomberg.com/news/articles/2025-10-21/microsoft-exempts-many-salespeople-from-return...
5•toomuchtodo•27m ago•4 comments

The Puratos Sourdough Library

https://sourdoughlibrary.puratos.com/en/virtual-sourdough-library
3•valzevul•31m ago•0 comments