heroui logo

Abnormally High AWS Instances Launched by User - MLTK

Splunk Security Content

View Source
Summary
The detection rule 'Abnormally High AWS Instances Launched by User - MLTK' analyzes AWS CloudTrail logs to identify anomalies in the number of EC2 instances launched by users. This rule flags any user who successfully initiates an abnormally high number of AWS instances over a given timeframe, suggesting potential misuse or malicious behavior, such as cryptomining activities. It relies on the default fields and statistics from the AWS CloudTrail dataset and uses a specified threshold to determine what constitutes 'abnormally high'. The use of the latest Change Datamodel indicates that this rule may not fully comply with streamlining and operational best practices, prompting its deprecation in favor of more updated methods. Adjustments based on environmental context are recommended, particularly filtering out known service accounts which may frequently trigger alerts due to their operational patterns.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
  • Network Traffic
  • User Account
ATT&CK Techniques
  • T1078.004
Created: 2024-11-14