Business Plan

Detect Stolen AWS Credentials

Plant fake AWS IAM keys with zero permissions across your infrastructure. When an attacker steals and uses them — anywhere in the world — you get an instant alert with their IP, region, and the API action they attempted.

How Credential Tokens Work

Real AWS IAM credentials with zero permissions, monitored 24/7 via CloudTrail.

Real Credentials

We provision actual AWS IAM access keys in our monitored accounts. They look and feel authentic.

Zero Permissions

The IAM user has no policies attached. The credentials cannot access, modify, or delete anything.

Global Monitoring

CloudTrail captures every API call attempt from any AWS region worldwide, in real-time.

Instant Alerts

Within seconds of use, you receive an alert with full details: IP, action, region, user agent.

Where to Plant Credentials

.aws/credentials Files

Add to ~/.aws/credentials on servers, dev machines, and shared infrastructure.

CI/CD Pipeline Configs

Embed in GitHub Actions secrets, Jenkins configs, or GitLab CI variables.

.env Files

Plant in .env files alongside real environment variables.

Code Repositories

Add to config templates, .env.example files, or old commit history.

Docker Images

Bake into container images where credential files might be extracted.

Kubernetes Secrets

Deploy as K8s secrets that would be found during cluster compromise.

What You Capture

Every stolen credential usage gives you actionable intelligence about the attacker.

Source IP + Geolocation

Every API call reveals the attacker's IP address and geographic location.

AWS API Action

See exactly which API the attacker called — sts:GetCallerIdentity, iam:ListUsers, s3:ListBuckets, etc.

Region & User Agent

Know which AWS region was targeted and what tool the attacker used.

Token Identification

Each token has a name so you know exactly which planted credential was compromised.

Alert: Stolen AWS Credential Used
Token Name
staging-deploy-key
Time
2026-03-22 14:23:41 UTC
API Action
iam:ListUsers
Region
eu-west-1
Source IP
103.45.xx.xx
Location
Mumbai, India
User Agent
python-requests/2.31.0

Credential Tokens vs CloudTrail-Only

CloudTrail Alone

Noisy

Thousands of legitimate API calls per hour

Slow

Manual log analysis required

Ambiguous

Hard to distinguish malicious from legitimate

Reactive

Detected after damage is done

Tripwires Credentials

Zero Noise

Nobody should ever use these credentials

Instant

Sub-second alerting on any use

Definitive

Any use = confirmed credential theft

Proactive

Detect theft before damage occurs

How It Works

Four simple steps to detect stolen AWS credentials anywhere in the world.

1

Create Token

We provision real AWS IAM credentials in our monitored accounts with zero permissions attached.

2

Plant Credential

Add the access key to config files, repositories, CI/CD pipelines, or anywhere credentials live.

3

Attacker Uses Key

When stolen credentials hit any AWS API endpoint in any region, CloudTrail captures it.

4

Instant Alert

You receive an alert within seconds with source IP, API action, region, and user agent details.

Stop Credential Theft in Its Tracks

AWS credential tokens are available in Business plan at £199/month.