
Summary
This detection rule identifies potentially malicious behavior related to AWS IAM accounts by tracking concurrent sessions stemming from multiple unique IP addresses within a 5-minute timeframe. Utilizing AWS CloudTrail logs, particularly the `DescribeEventAggregates` event, the rule flags instances where an IAM user appears to be logging in from various locations simultaneously. This can be indicative of a session hijacking attack, where an attacker might be using stolen session tokens to gain unauthorized access to cloud resources. Such incidents can pose significant risks, including data theft and the exploitation of corporate cloud environments. Organizations must treat these alerts with caution, as they can signify attempts at account takeover or unauthorized access to sensitive environments.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Cloud Storage
- Application Log
ATT&CK Techniques
- T1185
Created: 2024-11-14