April 10, 2023, 9:27 a.m. | Harsh Varagiya

InfoSec Write-ups - Medium infosecwriteups.com

It is really not that difficult to find AWS credentials in the wild — from accidental github commits to plaintext keys in android apps decompiled on bevigil.

But in the end, everything gets logged. CloudTrail Event history will pinpoint the User / AccessKey that made the AWS API Calls. Hence it is important to evade attribution and keep the found credentials (Access Keys, Tokens) valid for a longer time if at all possible.

Here is the result of one such …

attribution aws aws-iam aws-security cloud cloud security moving

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cybersecurity Engineer

@ Booz Allen Hamilton | USA, VA, Arlington (1550 Crystal Dr Suite 300) non-client

Invoice Compliance Reviewer

@ AC Disaster Consulting | Fort Myers, Florida, United States - Remote

Technical Program Manager II - Compliance

@ Microsoft | Redmond, Washington, United States

Head of U.S. Threat Intelligence / Senior Manager for Threat Intelligence

@ Moonshot | Washington, District of Columbia, United States

Customer Engineer, Security, Public Sector

@ Google | Virginia, USA; Illinois, USA