Comment Re:Not a Great Response (Score 1) 387
Working with Amazon, they can create a new account, give it a strong password, and begin cleaning up the mess with the new account (which the hacker will be unaware of). Now they can, at their own leisure, change passwords, administer accounts, delete crap created by the hacker, etc...
I'm missing something. In order for you to use that nice new account with the strong password, Amazon is going to have to connect your data servers back up with the internet, right? And the instant they do that, the hacker has all their access restored too, right? What's stopping them from immediately changing this new account's password to something they know? Or deleting it? Or doing all sorts of other nasty things before you discover each and every hidey-hole they made for themselves?
Really, I don't see how you can cleanup an attack in realtime with the network up without it turning into a game of corewars (which your side is not likely to win).