Suspicious activity

CloudTrail trail logging stopped from Tor IP address

Risk Level

Imminent Compromised (2)



Orca detected that an API call to 'StopLogging' CloudTrail events was made from a tor IP - {MaliciousIp.MaliciousIp}, the operation was successful. Aws CloudTrail service consists of a set of trails, each defines a different logging configuration. By calling the StopLogging api, logging in a specific trail will be disabled. The call from a tor ip might indicates of an attempt of an attacker to avoid logging.
  • Recommended Mitigation

    It is recommended to review the permissions which were used to make this api call. In case the trail is active, enable logging and look for a malicious activity from the tor address.