Saturday, January 4, 2025
HomeAWSEC2 Grouper Hackers Using AWS Tools To Exploit Compromised Credentials

EC2 Grouper Hackers Using AWS Tools To Exploit Compromised Credentials

Published on

SIEM as a Service

Cloud security researchers have uncovered alarming trends in identity compromises within Amazon Web Services (AWS) environments.

Among the most prolific threat actors is a group dubbed “EC2 Grouper,” known for exploiting compromised credentials to carry out sophisticated attacks using AWS tools.

Over the past couple of years, EC2 Grouper has been active in dozens of customer environments, marking them as a persistent threat to cloud infrastructures.

- Advertisement - SIEM as a Service

Tactics and Techniques

EC2 Grouper leverages AWS PowerShell tools to automate their attacks, with their user agent providing a key early indicator of their activities.

Initially consistent over several years, their user agent recently evolved to include unusual hash (#) characters, signaling potential countermeasures against traditional detection methods.

Other identifying markers include the creation of security groups with systematic naming conventions such as “ec2group,” suffixed with sequential numbers (e.g., ec2group12345).

These groups are created using the CreateSecurityGroup API, a tactic enabling lateral movement and potential resource hijacking.

The group’s modus operandi involves gathering intelligence about cloud environments through APIs, including:

  • DescribeInstanceTypes: To inventory EC2 types.
  • DescribeRegions: To identify available regions for resources.
  • DescribeVpcsDescribeSecurityGroups, and DescribeInstances: To map the customer’s environment.
  • RunInstances: To launch new EC2 instances.

Interestingly, EC2 Grouper often refrains from configuring inbound access using the AuthorizeSecurityGroupIngress API.

Instead, they occasionally employ APIs like CreateInternetGateway and CreateVpc to establish remote access pathways.

EC2 Grouper’s attacks are typically fueled by compromised AWS credentials, often originating from code repositories where developers accidentally expose sensitive keys.

Compromised AWS Keys
Compromised AWS Keys

According to the Fortinet reports, public repositories have been a hotbed for such incidents, with the group taking advantage of credentials leaked through platforms like GitHub.

Detecting EC2 Grouper’s illicit activities hinges on correlating multiple signals. While atomic indicators like user agents or security group conventions can assist in attribution, they alone are insufficient for reliable detection due to their transient nature. Key defensive strategies include:

  • Secret Scanning Services: Utilizing tools like GitGuardian and GitHub’s secret scanning to detect exposed credentials.
  • Composite Alerts: Correlating various signals, such as unusual API sequences, privilege escalation attempts, and anomalous environment behavior.
  • Anomaly Detection: Identifying deviations in cloud usage patterns to flag potential reconnaissance or malicious actions.

The rise of attackers like EC2 Grouper underlines the critical need for robust cloud security practices.

While identifying malicious use of compromised credentials remains challenging, advanced detection mechanisms, supplemented by tools like Lacework FortiCNAPP, can provide comprehensive protection.

As attackers continue to refine their techniques, organizations must prioritize proactive monitoring, credential hygiene, and anomaly detection to safeguard their cloud environments.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...

Apple Agrees to $95M Settlement Over Siri Privacy Lawsuit

Apple Inc. has agreed to pay $95 million to settle a proposed class-action lawsuit...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...