EXAMPLES: The researchers said the threat actors can now identify all <identity and access management> (IAM) permissions, elastic computer cloud instances, S3 buckets, CloudTrail configurations, and CloudFormation operations granted to the compromised AWS credentials.