What happens if you accidentally commit your AWS access token to public GitHub?
After my successful usage of AWS services accidentally committed accessKeyId ,secretAccessKey & region information to public git.
after 2 hours usually i used to check EC2 dashboard suddenly i came to know 20 instances running that too with static IP allocation in Ohio region i got shocked and terminated all my instances .
Then to make sure i checked in other regions whether any instances activated or not,yes there too 20 instances were running.So in all 15 regions 20 instances were running that means 20 x 15 = 300 virtual machines were running with my knowledge.Yeah its a hack to perform bitcoin mining.
So what really happened here when ever you accidentally committed any auth token or secret parameters to your git it will be automatically fetch by the bots that running on any where in the world.
How can bots find my exact token when there are billions of projects available on github. One way by using Github search API’s anyone can query into repository,commits,code,users by passing a query
In my case i have saved my token in config file with parameter name as accessKeyId, bots might have written a query like below.
So once it started to hit result may get as successful response along with our actual key that they wanted to hack.
Then by using aws sdk’s intruders started to create a EC2 high power machine using programs in few seconds.We will not get notified whether machine got activated or not we will be the looser.
First thing make sure that you have terminate all the instances from all regions.
Then delete your IAM Access Key Go to services > IAM
After doing this you can secure from intruder.
But one of the good thing in there is a good bot GitGuardian that was sending me an email stating that AWS key commit is detected.
After reading this mail i deleted that entire project which i pushed in public repo.
Make sure that you when ever not using SDK detach policy from groups from IAM page
So how to secure own AWS account,below i have mentioned some best way to protect your keys in production.
Don’t Hard code AWS Credentials anywhere in the code,it is clearly mentioned in official documentation
- Load your credentials from shared credentaisl files
- Linux users:
- Windows users:
aws_access_key_id = <YOUR_ACCESS_KEY_ID>
aws_secret_access_key = <YOUR_SECRET_ACCESS_KEY>
2. Load it from Environment variable
Before committing your code it is advice to run git secrets
git-secrets scans commits, commit messages, and
--no-ff merges to prevent adding secrets into your git repositories. If a commit, commit message, or any commit in a
--no-ff merge history matches one of your configured prohibited regular expression patterns, then the commit is rejected.Read here how to set up git secrets
For more detailed explanation and for other ways read official documentation here
Bill amount i was supposed to pay was $4439.58 USD