Cannot access own VPC and other configuration

0

When I signed up for AWS there was already configurations that were being used that I did not set up at all, I had never used the service before. There was Kubernetes, Lambda, VPC set up and activated in many regions, enabled. I tried to delete all of these things as I had no idea that AWS was being used without my knowledge. There was not even Billing set up so I have no idea how this must have happened. I cannot connect to a region Osaka and delete the instances and VPC configurations.

I am the root user, but there is something that doesn't allow me full access to my own account. For some background whoever responsible set up Google Cloud Services under my emails without Billing set up with instances running without me setting up the services. I check every device and capture traffic and everything points to a Nimbus cloud(configuration found from my cell service to internet), which I had to look up. Every device becomes infected when I download Chrome and the traffic coming and going from devices is DODNIC(health.mil) on every port. I went into one console on US-East Virginia and it had past connections from US-Gov-East and US-Gov-West.

How do I take full control of my account and be able to delete regions and the configurations which I am unable to use? I need urgent help.

1개 답변
0

Check IAM users and roles and check CloudTrail to see who and when created resources in your account. If IAM user or Role suspicious, remove it.

profile picture
전문가
답변함 10달 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠