Skip to main content

Unexpected AWS EC2 Windows Adminstrator encrypted password enumeration

ID:aws_ec2_admin_credential_enumeration_anomaly
Data type:AWS CloudTrail
Severity:
Low
-
Medium
MITRE ATT&CK:TA0006:T1555

Description

AlphaSOC detected attempts to retrieve encrypted Windows administrator passwords from AWS EC2 instances, which may indicate unauthorized attempt to collect administrator credentials.

Impact

Access to Windows administrator passwords enables threat actors to gain full control over EC2 instances, access sensitive data, modify system configurations, and establish persistence. Compromised credentials can lead to resource exploitation, data breaches, and lateral movement across the infrastructure.

Severity

SeverityCondition
Low
Excessive encrypted password enumeration attempts
Medium
Suspicious excessive enumeration attempts

Investigation and Remediation

Review AWS CloudTrail logs to identify the source IP address, IAM user, and targeted instances. Check IAM policies and roles for unnecessary GetPasswordData permissions. If unauthorized access is confirmed, rotate instance passwords, update key pairs, and review security group configurations.