heroui logo

AWS Backdoor User Creation

Anvilogic Forge

View Source
Summary
This detection rule is designed to identify potentially malicious activities related to the creation and management of AWS user credentials and accounts, indicative of backdoor access installations. Specifically, it looks for actions that involve creating new user accounts, generating access keys, attaching extensive permissions via roles, and producing security groups. Indicators include event types such as 'CreateUser', 'CreateAccessKey', 'AttachRolePolicy' for 'AdministratorAccess', and other related IAM operations. A notable technique for attackers, particularly following credential compromise, is to create new user accounts or manipulate existing credentials to retain access to AWS environments. The logic executes a series of commands on AWS CloudTrail logs, focusing on events tied to identity and access management. If such activities are detected, they could signify an ongoing compromise and warrant further investigation.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Cloud Storage
ATT&CK Techniques
  • T1136.003
  • T1098.001
Created: 2024-02-09