Compromised AWS EC2 Instance


Detect an Impossible Travel event when a @userIdentity.type: {{@userIdentity.type}} uses an AWS EC2 access key and filter out VPNs and AWS Internal IPs.


The Impossible Travel detection type’s algorithm compares the GeoIP data of the last log and the current log to determine if the EC2 instance with @userIdentity.session_name: {{@userIdentity.session_name}} traveled more than 500km at over 1,000km/hr and used an AWS EC2 access key.

Triage and response

  1. Determine if the @userIdentity.accessKeyId: {{@userIdentity.accessKeyId}} for @userIdentity.session_name: {{@userIdentity.session_name}} instance should be used from {{}}, {{}} and {{}}, {{}}.
  2. If the EC2 access key should not be used from {{}}, {{}} and {{}}, {{}}., then consider isolating the account and reset credentials.
  3. Audit any instance actions that may have occurred after the illegitimate login.

NOTE VPNs and other anonymous IPs are filtered out of this signal


7 April 2022 - Updated rule name and signal message.