Skip to main content
AWS IAM Key Abuse: From Leak to Takeover operation cover
IntermediateSIEMPRO

AWS IAM Key Abuse: From Leak to Takeover

An investigation into a sophisticated cloud-native attack where exposed IAM credentials led to serverless exploitation, lateral movement via SSH key injection, and large-scale data exfiltration. You will analyze CloudTrail logs, VPC Flow logs, and GuardDuty alerts to trace the attacker's path from a leaked .env file to a full environment takeover.

45m
8 tasks
335 points
Pro

Start this operation

Requires a Pro subscription.

View Pro Plans

Free forever — no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

Identify the Source of Suspicious External Communication

15

On 2025-05-06T09:21:27.283Z, an alert triggered indicating a high volume of traffic directed toward the known C2 infrastructure domain1.com. You need to investigate the perimeter logs to determine which internal host initiated this connection for user m.chen.

SOC{...}Hint available
2

Tracing the Gateway: Identifying the Log Source

35

During the investigation of user m.chen's activity, a suspicious connection to domain1.com was flagged. You need to determine which architectural component or log source captured this specific event to verify the integrity of the traffic flow.

SOC{...}Hint available
3

Investigating C2 Traffic Persistence

50

After m.chen's workstation was compromised, telemetry indicates a connection attempt to known C2 infrastructure. Review the network logs to determine if the perimeter security successfully blocked this connection or if the traffic was permitted to pass through.

SOC{...}Hint available
4

Identifying the Authoritative Log Source

50

During the investigation of the connection to domain1.com, we need to verify which telemetry provider captured the initial event. Examine the SIEM logs for the user m.chen to determine the exact log source responsible for documenting this security event.

SOC{...}Hint available
5

Identifying C2 Network Communication

35

During the investigation of user m.chen's activity on 2025-05-03T15:24:55.566Z, we observed suspicious outbound traffic. You must determine how the attacker's infrastructure is receiving data from our internal network.

SOC{...}Hint available
6

Identifying Exfiltrated Configuration Artifacts

50

After establishing a connection to domain1.com, the adversary appears to have searched for sensitive local environment variables and credentials. You need to examine the telemetry associated with m.chen's activity to determine which specific file was interacted with during this phase of the breach.

SOC{...}Hint available
7

Investigating Suspicious Process Execution

50

During a routine audit of the user m.chen's activity, a suspicious outbound connection was flagged. You need to analyze the execution chain in the XDR panel to determine which system process was used as the primary shell to launch the connection.

SOC{...}Hint available
8

Identifying Process Creation Event IDs

50

Evidence suggests that the attacker established a connection to domain1.com shortly after a new process was spawned on the workstation. You need to investigate the raw logs to determine the standard security event identifier that recorded this process creation activity.

SOC{...}Hint available

8 tasks · 335 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Intermediate

Requires foundational alert triage skills. Multiple data sources to correlate.

Prerequisites

  • Basic understanding of security alerts
  • Familiarity with SIEM concepts

Ready to investigate?

This operation requires a Pro subscription.

View Pro Plans

Free forever — no credit card required

More Operations

View all

We use cookies to improve your experience and measure usage. Learn more