- An attacker gains access to a user’s credentials, which include their AWS access key ID and secret access key.
- With the stolen credentials, the attacker can access the user’s AWS account and identify running EC2 instances
- Once inside the instance, the attacker can exploit further vulnerabilities to escalate their privileges and gain root access
- The attacker can then tamper with the system configuration or install malicious software to maintain persistence and evade detection.
