
Summary
The Azure Suspicious Storage Access rule is designed to monitor and detect potentially malicious activity relating to access or attempts to list storage account access keys within Azure. Specifically, the rule identifies when an IP address accesses multiple storage accounts by utilizing the 'List Storage Account Keys' command. This type of activity can indicate nefarious attempts to gather credentials for unauthorized access or exfiltration of sensitive data. The detection is implemented via a Splunk query that sanitizes the source IP by removing any port numbers and subsequently aggregates data over time spans of 60 seconds. By employing statistical functions, the rule calculates the distinct count of bucket names accessed by IP addresses and the distinct access attempts from each IP, flagging instances where either count exceeds the defined thresholds, indicating suspicious behavior.
Categories
- Cloud
- Azure
Data Sources
- Cloud Service
- Cloud Storage
- User Account
ATT&CK Techniques
- T1530
Created: 2024-02-09