AWS Guard Duty: User/role with UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration.InsideAWS
GuardDuty finding was triggered for aws user.
GuardDuty finding was triggered for aws user.
GuardDuty finding was triggered for s3 bucket.
Orca detected that the root account was used to login to AWS console without Multi-Factor Authentication (MFA). Lack of MFA...
An EC2 role was used from an IP that doesn't fall within the whitelisted AWS IP range. The request could...
GuardDuty finding was triggered for ec2 instance.
GuardDuty finding was triggered for ec2 instance.
GuardDuty finding was triggered for ec2 instance.
GuardDuty finding was triggered for ec2 instance.
Suspicious traffic was found by AWS GuardDuty service on EC2 instance {AwsEc2Instance} ({AwsEc2Instance.InstanceId}) detected with malware by Orca. AWS GuardDuty...