heroui logo

AWS DisassociateAddress

Anvilogic Forge

View Source
Summary
The detection rule monitors the AWS API call 'DisassociateAddress', which is a potential sign of Elastic IP Hijacking. This attack may occur when threat actors utilize AWS resources to disassociate an Elastic IP from its assigned host and assign it to a malicious host. By executing the command 'DisassociateAddress', the attackers can manipulate the network infrastructure leading to unauthorized access or service disruption. The detection leverages AWS CloudTrail logs by querying specific events, aggregating data such as user information, timestamps, and the source IP attempts to track any disassociation actions that could indicate malicious behavior. The query results are further enhanced through lookups on DNS information and geolocation data to provide context around the potential attack, such as identifying the source of the request and any associated threat attributes.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Network Traffic
  • Logon Session
ATT&CK Techniques
  • T1098
  • T1562
Created: 2024-02-09