
Summary
This detection rule identifies potential security incidents involving AWS account logins. It tracks instances where an account successfully authenticates from more than one unique IP address within a 5-minute timeframe, leveraging AWS CloudTrail logs specifically focusing on `ConsoleLogin` events. The rationale behind this detection is that concurrent logins from multiple IPs could indicate compromised credentials, particularly if these logins coincide with a phishing attack. Such behavior, if confirmed as malicious, may enable unauthorized access to sensitive corporate resources and increase the risk of data breaches or more significant exploitation within the AWS environment.
Categories
- AWS
- Cloud
- Infrastructure
Data Sources
- Cloud Storage
- User Account
- Network Traffic
ATT&CK Techniques
- T1586
- T1535
- T1586.003
Created: 2024-11-14