heroui logo

S3 Bucket Enumeration AWS

Anvilogic Forge

View Source
Summary
This rule is designed to identify potential enumeration of Amazon S3 buckets within an AWS account through CloudTrail logs. It detects events where the 'ListObjects' or 'ListObjectsV2' API calls are executed, which are commonly utilized by threat actors to enumerate the objects stored in S3 buckets. The logic queries the AWS CloudTrail logs for the last two hours of events to capture any suspicious activity concerning the listing of bucket contents. The detection logic indicates that it specifically looks for AWS API calls associated with these events, thus forming a part of its broader concern regarding AWS security and potential unauthorized access. The threat actor association noted as 'GUI-vil' hints at the method of operation employed during this enumeration. This rule is categorized under discovery techniques as it aims to uncover information related to permissions and cloud resources used by an attacker.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Logon Session
ATT&CK Techniques
  • T1069.003
  • T1526
Created: 2024-02-09