AWS Account Hacked: A $213,000 Wake-Up Call on Cloud Security
A documented AWS account compromise drove roughly $213k in unauthorized charges. See how attacks unfold, how to respond fast, and how to harden accounts.

In September 2022, a Reddit user shared what they described as "one of the worst months of my life" after discovering their AWS account had been compromised. The result? A staggering $213,000 in unauthorized charges. The original post on r/aws sparked a crucial conversation about cloud security, provider support, and the steps every organization should take to prevent becoming the next victim.
"This bill is basically a life ending amount of money, and I'm not sure what to do at this point."
This story has a resolution: after the post gained visibility, AWS's Executive Customer Relations team reviewed the account and waived the entire invoice. Cloud providers review these cases individually, and a full credit is not guaranteed. The author subsequently deleted their AWS account and advocated for AWS to require multi-factor authentication (MFA) during account creation.
How Cloud Account Compromises Happen
Account compromises rarely happen through sophisticated zero-day exploits. The reality is far more mundane and preventable. Common vectors include:
Credential Exposure
Developers accidentally commit API keys or credentials to public repositories. Automated scanners continuously crawl GitHub, GitLab, and Bitbucket for exposed secrets. Within minutes of exposure, attackers can spin up expensive resources across multiple regions.
Phishing Attacks
Targeted phishing emails impersonating cloud providers trick users into entering credentials on fake login pages. Once attackers have console access, they can create new Identity and Access Management (IAM) users, disable billing alerts, and begin resource exploitation.
Weak or Reused Passwords
Accounts protected only by passwords, especially those reused across services, are vulnerable to credential stuffing attacks. When credentials from one breach match a cloud account, attackers gain immediate access.
Compromised Development Environments
Malware on developer machines can extract stored credentials, session tokens, or SSH keys. A compromised laptop becomes a gateway to production cloud resources.
What Attackers Do With Compromised Accounts
The Reddit thread revealed a pattern familiar to cloud security professionals. One commenter, u/benevolent001, shared their own experience:
"Similar experience here. Someone from Russia launched expensive machines. AWS didn't charge us after one month of investigation when proper documentation was provided."
Common attack patterns include:
- Cryptocurrency Mining: Spinning up hundreds of high-CPU instances across all available regions
- Data Exfiltration Staging: Using compromised accounts to store stolen data temporarily
- Botnet Infrastructure: Creating command-and-control servers for distributed attacks
- Resource Resale: Selling compute time to other malicious actors
Attackers specifically target services with high compute costs: EC2 instances with GPU capabilities, large SageMaker training jobs, and extensive Lambda invocations.
Immediate Response When You Discover a Compromise

Time matters. If you suspect unauthorized access, take these steps immediately:
1. Contain the Breach
- Disable or delete any IAM users, roles, or access keys you do not recognize
- Rotate credentials for all legitimate users
- Review and revoke any unauthorized permissions
- Terminate unfamiliar instances across ALL regions (attackers deliberately spread resources)
2. Preserve Evidence
- Enable CloudTrail logs if not already active
- Export billing data showing the unauthorized charges
- Document the timeline of discovery
- Screenshot any unauthorized resources before termination
3. Contact Your Provider
- Open a high-priority support case immediately
- Be specific: state this is unauthorized access, not a billing dispute
- Provide evidence of the compromise pattern
- Request charge review based on unauthorized access
4. Strengthen Defenses
- Enable MFA on all accounts immediately
- Implement strict IAM policies
- Set up billing alerts at multiple thresholds
- Consider using AWS Organizations with Service Control Policies
Prevention Best Practices
The author of the Reddit post made a specific recommendation that resonated with the community:
"[AWS should] require multi-factor authentication during account creation to reduce vulnerability."
While cloud providers continue improving default security, organizations must implement comprehensive protection.

Multi-Factor Authentication (MFA)
MFA should be mandatory for every user with console or programmatic access. Hardware security keys provide the strongest protection, followed by authenticator apps. SMS-based MFA, while better than nothing, remains vulnerable to SIM swapping attacks.
Billing Alerts and Budgets
Configure alerts at 50%, 80%, and 100% of expected spend. Create budget actions that can automatically disable services when thresholds are exceeded. One commenter noted that even with billing alerts, attackers who gain root access can disable notifications before they trigger.
Least Privilege IAM Policies
Every user and service should have only the permissions required for their specific function. Avoid using root credentials for daily operations. Implement separate accounts for development, staging, and production environments.
Secrets Management
Never store credentials in code repositories. Use dedicated secrets management services like AWS Secrets Manager, HashiCorp Vault, or similar solutions. Implement automatic credential rotation where possible.
Network Segmentation
Limit internet exposure of resources. Use a Virtual Private Cloud (VPC) with private subnets for sensitive workloads. Implement security groups with explicit allow rules rather than permissive defaults.
Navigating Provider Support
The Reddit discussion highlighted the challenges of working with large cloud providers during security incidents. The author initially received encouraging responses but eventually faced copy-pasted messages stating support had "done everything they can."
The breakthrough came when Corey Quinn (u/Quinnypig), a well-known AWS community member, offered direct assistance:
"On it! Will follow up on Monday. Breathe. It'll be okay."
This external visibility ultimately connected the case to AWS's Executive Customer Relations team, resulting in the waived charges.
Strategies for Effective Escalation
- Document every interaction with support
- Request case escalation explicitly
- Reference the unauthorized access nature of the incident
- Consider engaging community resources or advocacy if standard channels fail
- For enterprise accounts, leverage your account manager relationship
The InMotion Cloud VPC Advantage
At InMotion Cloud, we designed our Virtual Private Cloud (VPC) infrastructure with security as a foundational principle. Our OpenStack-based platform provides several inherent advantages:
Transparent Resource Control
You see exactly what resources are running and what they cost. No surprises. No hidden charges accumulating in obscure regions.
Isolated Environments by Default
Every VPC operates in true isolation. Your resources exist in a dedicated environment, reducing the blast radius of any potential compromise.
Predictable Pricing
Fixed-price VPCs eliminate the bill shock that characterizes pay-per-use hyperscaler models. Even in a worst-case scenario, your exposure is limited and known.
Direct Expert Support
When issues arise, you reach real engineers who understand your infrastructure. No escalation mazes. No copy-paste responses.
Built-in Security Controls
Security groups, network ACLs, and comprehensive logging come standard. We help you implement defense in depth from day one.
Key Takeaways
The $213,000 AWS hack story serves as a powerful reminder that cloud security requires active management. The author's experience, while ultimately resolved favorably, represented weeks of stress and uncertainty.
Immediate Actions You Can Take Today
- Audit all accounts for MFA enforcement
- Review IAM policies for excessive permissions
- Configure billing alerts at multiple thresholds
- Implement secrets scanning in your CI/CD pipeline
- Document your incident response procedure
Cloud infrastructure offers tremendous capability, but with that capability comes responsibility. The difference between a minor security incident and a six-figure bill often comes down to the preventive measures in place before the attack occurs.
If you are evaluating cloud providers or reconsidering your current infrastructure, we invite you to explore how InMotion Cloud's approach to security, transparency, and support can reduce your risk profile while delivering the performance your applications demand.
Related resources
Explore more stories and guides that pair well with this article.

Case study of a $7 to $1,300 cloud bill from a DDoS attack. Learn how Denial of Wallet attacks work, why providers bill victims, and how to protect yourself.
