Skip to content
Threat Feed
medium advisory

AWS Root Account Usage Detected

The AWS root account, which grants unrestricted access to all resources within an AWS account, was used, potentially indicating unauthorized activity, privilege escalation, or a breach of security best practices.

The use of the AWS root account should be strictly limited to specific tasks that cannot be performed with IAM users or roles. This alert indicates that the root account was used, which could signify various security concerns. An attacker with access to the root account can perform any action within the AWS environment, including creating new users, modifying security policies, accessing sensitive data, and deleting resources. Defenders should investigate each instance of root account usage to determine legitimacy. This activity may also indicate a misconfiguration where IAM roles should be used.

Attack Chain

  1. An attacker gains access to the AWS root account credentials through credential theft or other means.
  2. The attacker authenticates to the AWS Management Console or uses the AWS CLI with the root account credentials.
  3. The attacker enumerates AWS resources to identify potential targets for privilege escalation.
  4. The attacker creates or modifies IAM policies to grant themselves additional permissions.
  5. The attacker may create new IAM users or roles with elevated privileges.
  6. The attacker uses the elevated privileges to access sensitive data stored in S3 buckets or other AWS services.
  7. The attacker modifies security configurations, such as network access control lists or security groups, to facilitate lateral movement or data exfiltration.
  8. The attacker could disable logging features to cover tracks.

Impact

Compromise of the AWS root account can lead to a complete breach of the AWS environment, resulting in unauthorized access to sensitive data, data loss, service disruption, and potential financial losses. Attackers can leverage root privileges to perform nearly any action within the AWS account, affecting all services and resources. The number of affected victims depends on the scope and criticality of the AWS environment.

Recommendation

  • Deploy the Sigma rule “AWS Root Credentials” to your SIEM to detect root account usage based on CloudTrail logs.
  • Investigate all instances of root account usage identified by the “AWS Root Credentials” Sigma rule to determine legitimacy.
  • Enforce multi-factor authentication (MFA) on all AWS accounts, including the root account, as documented in AWS documentation.
  • Implement the principle of least privilege by granting IAM users and roles only the permissions they need to perform their tasks.
  • Regularly audit IAM policies and user permissions to identify and remove unnecessary privileges.
  • Disable or restrict root account access wherever possible, delegating tasks to IAM users/roles.

Detection coverage 3

AWS Root Account Login Without MFA

high

Detects AWS root account login events without multi-factor authentication (MFA), which could indicate a compromised account.

sigma tactics: initial-access techniques: T1078.004 sources: aws, cloudtrail

AWS Root Account Usage

medium

Detects AWS root account usage for any API call, highlighting a potential security risk.

sigma tactics: privilege-escalation techniques: T1078.004 sources: aws, cloudtrail

AWS Root Account Key Created

critical

Detects creation of an AWS root account access key.

sigma tactics: persistence techniques: T1098 sources: aws, cloudtrail

Detection queries are kept inside the platform. Get full rules →