Skip to main content

Unsuccessful attempt to assume AWS root account

ID:aws_assume_root_failure
Data type:AWS CloudTrail
Severity:
Low
-
Medium
MITRE ATT&CK:TA0007:T1580

Description

AlphaSOC detected an unsuccessful attempt to assume the AWS root account using the AssumeRoot action. The root account has unrestricted access to all AWS services and resources, making it a prime target for threat actors. A failed AssumeRoot action may indicate a malicious but unsuccessful effort to gain root access, potentially signaling unauthorized activity within the AWS environment.

Impact

Assuming the AWS root account grants complete control over the entire AWS infrastructure. A threat actor with root access can create, modify, or delete any resources, potentially leading to data breaches, service disruptions, or financial losses.

Severity

SeverityCondition
Low
Unsuccessful attempt to assume AWS root account
Medium
Unsuccessful and unexpected attempt to assume AWS root account

Investigation and Remediation

Review AWS CloudTrail logs to identify the origin of the request, including IP address, user agent, and any associated AWS IAM users or roles. Verify whether the AssumeRoot action was authorized. If unauthorized, restrict access for the potentially compromised AWS IAM role or user and enable multi-factor authentication (MFA) if not already in place.