Hazardous (3)
Recommended Mitigation
It is recommended to isolate the impacted EC2 instance, analyze it, and in case you are unable to identify any threat, stop any unauthorized activity on your EC2 instance. In case there is no confidence in the machine's sanity, you may terminate the compromised EC2 instance and replace it with a new one.