Discussion about this post

User's avatar
Neural Foundry's avatar

Brilliant breakdown on this attack chain. The use of DryRun flags for reconaissance is something I've seen in incident reports but never explained this clearly - it basically let's attackers map permisions without triggering resource-creation alerts. Back when I was doing cloud cost optimizaiton, we'd see random ECS spikes but never connected the dots to IAM compromise. The ten minute window is terrifying tho; most SOC teams dunno they're under attack until the bill comes in.

Expand full comment

No posts

Ready for more?