1. Unauthorized Access via Compromised EC2 Instance
An attacker gains unauthorized access to an EC2 instance after compromising exposed SSH credentials. After logging in, they initiate AWS API calls to enumerate the environment.
The attacker queries IAM roles, looking for elevated privileges or unused roles, and inspects the list of EC2 instances, storage volumes, and other resources.
This enumeration helps the attacker identify pathways for privilege escalation, sensitive data locations, and potential lateral movement targets.
By mapping the environment, the attacker’s next steps may involve elevating privileges or exploiting vulnerable configurations to access additional resources.
2. Misconfigured Monitoring Script in a Production Environment
A cloud operations team deploys a monitoring script to track resources within the AWS environment.
The script periodically queries EC2 instance statuses, IAM roles, and attached policies to ensure compliance with internal policies.
However, due to a misconfiguration, the script runs more frequently than intended and generates a high volume of API calls from specific EC2 instances. Vectra’s detection flags this as suspicious enumeration.
During investigation, the security team verifies the activity as legitimate but realizes the script’s frequency needs adjustment.
They update the script to reduce API call volume, ensuring compliance without triggering unnecessary alerts.