How A Compromised AWS Lambda Function Led to a Phishing Attack | EP. 1

29/04/2025 12 min Temporada 1 Episodio 1

Listen "How A Compromised AWS Lambda Function Led to a Phishing Attack | EP. 1"

Episode Synopsis

In this video, I’ll be going over detection opportunities at various stages of cloud security attacks.Compromised Cloud Compute Credentials: Case Studies From the Wild_____________TIMESTAMPS00:00 Intro00:40 The Attack Case02:12 The Attack Graph02:44 The Attack Flow 03:06 Detection Opportunity 1: Enumeration/Reconnaissance/Discovery - Cloud Infrastructure Discovery05:27 Detection Opportunity 2: Persistence - Create Cloud Account 08:19 Detection Opportunity 3: Impact - Resource Hijacking09:54 Detection Opportunity 4: Defense Evasion - Indicator Removal10:23 Detection Opportunity 5: Credential Access - Stealing an application access token12:04: Conclusion_____________⚡️JOIN 6,000+ CWX MEMBERS ON DISCORD📰 SUBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER🥶 CYBERWOX MERCH_____________🧬 CYBERWOX RESOURCES🔹 Cyberwox Cybersecurity Notion Templates for planning your career🔹 Cyberwox Best Entry-Level Cybersecurity Resume Template🔹 Learn AWS Threat Detection with my LinkedIn Learning Course_____________📱 LET'S CONNECT → ⁠⁠IG⁠⁠→ ⁠⁠Threads⁠⁠→ ⁠⁠Substack⁠⁠→ ⁠⁠Twitter⁠⁠→ ⁠⁠Linkedin⁠⁠→ ⁠⁠Tiktok⁠⁠Email: [email protected]_____________⚠️DISCLAIMERThis description has some affiliate links, and I may receive a small commission for purchases made through these links. I appreciate your support!Email: [email protected]

More episodes of the podcast Detection Opportunities