heroui logo

AWS SES Modification

Anvilogic Forge

View Source
Summary
The AWS SES Modification rule is designed to detect the use of AWS API calls that may signify SES (Simple Email Service) enumeration attempts. It specifically targets the API methods GetAccount and ListIdentities, which can be exploited by threat actors to gather information about email identities associated with an AWS account. The detection logic is implemented in Splunk, leveraging AWS CloudTrail logs to monitor for potentially malicious actions. Anomalous access patterns are identified through the `TERM` function focusing on events related to email identity verification and account settings modification. The events are then aggregated, providing insights into the users, accounts, regions, and other relevant aspects involved in the requests. Furthermore, the rule enhances its output with geolocation data and DNS lookups for the IP addresses involved to further enrich the context of the alert, allowing security teams to understand the source of suspicious activities and to investigate potential incidents effectively.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Network Traffic
ATT&CK Techniques
  • T1069
  • T1087
Created: 2024-02-09