heroui logo

AWS S3 Exfiltration Behavior Identified

Splunk Security Content

View Source
Summary
This correlation rule identifies potential data exfiltration attempts from AWS S3 by analyzing multiple risk events related to collection and exfiltration tactics. It processes information from AWS data sources, looking for patterns where at least two distinct analytics associated with unique MITRE ATT&CK IDs are triggered simultaneously for the same risk object. Triggering such analytics indicates suspicious behavior that warrants investigation, as it may reveal unauthorized data access or data theft efforts targeting sensitive information in AWS S3. Security teams are advised to act promptly if such activity is detected, as it could pose a significant risk to the integrity and confidentiality of organizational data.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Network Traffic
ATT&CK Techniques
  • T1537
Created: 2024-11-14