heroui logo

AWS S3 Ransomware Note Upload Detection

Panther Rules

View Source
Summary
This rule is designed to detect suspicious activity in AWS S3 buckets where files resembling ransomware notes are uploaded. Attackers typically use specific filenames such as HOW_TO_DECRYPT_FILES.txt or RANSOM_NOTE.txt to communicate ransom demands to victims following a ransomware attack. The rule monitors AWS CloudTrail logs for PUT object events in S3, focusing on files that match common ransomware note patterns. Upon detection, the rule triggers a query of CloudTrail logs for related activity, facilitating a deeper investigation into potential unauthorized access or malicious uploads. This includes examining previous S3 API calls and checking user behaviors to identify any anomalies or coordinated attack patterns.
Categories
  • Cloud
  • AWS
  • Infrastructure
Data Sources
  • Cloud Storage
  • Logon Session
Created: 2025-12-10