Description
Unlike in the past, the user created instances in an amount which is unusual to its regular activity. It was found that few of those EC2 instances contain malware. It is possible that the role was hijacked and used to create instances for malicious purposes in the environment, cryptomining for example.