Analysis of a real-world attack chain in AWS

https://sysdig.com/blog/cloud-breach-terraform-data-theft/

  • Compromise container running on EKS
  • Steal instance credentials of worker nodes through IMDS, "through IMDSv1"
  • IAM user credentials in Lambda environment variables and in plaintext in an S3 bucket
  • Disable CloudTrail logs
  • Steal "proprietary software"
  • Find credentials of an IAM user in a Terraform state file in an S3 bucket
  • Pivot to another AWS account
  • On the attack chain:

    #aws #cloudsecurity

    SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft – Sysdig

    The Sysdig Threat Research Team recently discovered a sophisticated cloud operation in a customer environment, dubbed SCARLETEEL.

    Sysdig