heroui logo

AWS IAM Virtual MFA Device Registration Attempt with Session Token

Elastic Detection Rules

View Source
Summary
This detection rule focuses on identifying suspicious actions related to the registration or enabling of a Virtual Multi-Factor Authentication (MFA) device within AWS IAM, particularly when using temporary security credentials (access keys starting with 'ASIA'). These credentials indicate the use of session tokens, which can potentially be exploited by adversaries seeking to escalate privileges or maintain persistence in cloud environments. The rule analyzes AWS CloudTrail logs to detect events related to the creation or enabling of MFA devices and raises alerts when suspicious patterns are detected. Key investigation steps include identifying the user involved, examining previous access patterns, and validating the legitimacy of the sources of these actions. It is important to assess the context of the request to distinguish between legitimate administrative activity and potential threats, as false positives might arise from authorized users or automation tools performing similar tasks.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Cloud Storage
  • User Account
ATT&CK Techniques
  • T1098
  • T1098.005
Created: 2025-04-11