Description
The role created ec2 instances in an amount which is unusual to its usage profile. It was found that at least one of those ec2 instances contains miner according to the bash history file. It is possible that the role was hijacked and used to create instances for malicious purposes in the environment, such as cryptomining. In addition, the api call was triggered from a tor ip address.