FortiGuard Labs Connects New EC2 Grouper Hackers to AWS Credential Vulnerabilities

Alert on EC2 Grouper: Exploiting AWS Credentials Through Unique Patterns

Recent research from Fortinet’s FortiGuard Labs has identified a concerning threat actor known as "EC2 Grouper," which is exploiting AWS credentials and tools in a highly distinguishable manner. This group primarily uses naming conventions akin to “ec2group12345” to set up security groups in their operations. Their reliance on specific recognition patterns has led to their identification across several customer environments, revealing a systematic approach in their techniques.

Central to EC2 Grouper’s successful infiltration strategies is the compromise of credentials sourced from code repositories linked to legitimate accounts. This tactic allows the adversary to circumvent basic security measures, as they often operate under the guise of valid users. The attack methodology is efficient, leveraging automated APIs for reconnaissance, resource provisioning, and security group manipulation, while avoiding manual methods that could trigger alerts.

The nature of this group’s operations poses significant challenges for detection. Traditional indicators, such as specific user agents and naming conventions, offer only sporadic reliability. Attackers can easily change these identifiers to elude detection. Furthermore, researchers noted that no instances of AuthorizeSecurityGroupIngress calls were detected, a critical component of configuring inbound access in compromised environments. Instead, their activities centered around methods like CreateInternetGateway and CreateVpc, enabling remote access without drawing immediate suspicion.

As organizations grapple with the persistent threat of attackers exploiting cloud environments, it has become increasingly critical to develop a robust detection strategy. The ability to analyze signs such as credential compromise and API utilization is paramount. Fortinet suggests that monitoring for unusual activity related to recognized secret scanning services can effectively identify potential credential breaches, which serve as the primary pathway for attackers like EC2 Grouper.

In response to such threats, organizations should consider implementing Cloud Security Posture Management (CSPM) tools, ensuring continuous surveillance and assessment of their cloud security posture. Employing anomaly detection techniques can further help identify unexpected API calls, unusual resource creation, or potential data exfiltration efforts. Such proactive measures are crucial in an era where cloud infrastructure is frequently targeted by sophisticated adversaries.

The EC2 Grouper, in concert with other hacking groups, underscores the ongoing risks associated with the exploitation of cloud platforms. The evolving landscape of cyber threats demands an adaptive security strategy, integrating detection, monitoring, and prevention to thwart adversaries keen on leveraging emerging technologies and practices for malicious ends. Awareness of tactics outlined in the MITRE ATT&CK framework, including initial access and privilege escalation, is essential for business owners aiming to fortify their defenses against these increasingly sophisticated challenges.

Organizations must remain vigilant, equipping themselves with the necessary knowledge and tools to defend against the relentless tide of cyber threats targeting their digital infrastructure. This vigilance will be key in ensuring resilience amid a landscape fraught with potential breaches and vulnerabilities thus safeguarding sensitive data against compromise.

Source