Skip to main content

Use of an AWS IAM user that was unused for a long period

ID:aws_iam_user_wakeup
Data type:AWS CloudTrail
Severity:
Medium
MITRE ATT&CK:TA0001:T1078.004

Description

AlphaSOC detected that an AWS IAM user account that was inactive for an extended period was unexpectedly used. This could indicate that a dormant account has been compromised. Threat actors often target unused accounts as they are less likely to be monitored closely.

Impact

The unexpected use of a long-dormant IAM user account may indicate unauthorized access to AWS resources, potentially leading to data breaches, resource misuse, or further compromise of the AWS environment.

Severity

SeverityCondition
Medium
Use of an AWS IAM user that was unused for a long period

Investigation and Remediation

Review AWS CloudTrail logs to identify all actions performed by this user. Verify whether the use of the dormant account was authorized and if not, rotate potentially compromised credentials and perform a security audit of the AWS environment for other signs of compromise.