
Summary
The rule detects potentially suspicious events associated with the 'GetSigninToken' API call within AWS. It focuses on identifying instances where adversaries could exploit this API through tools like 'aws_consoler' to generate temporary federated credentials. This circumvents the need for multi-factor authentication (MFA) while allowing the adversary to mask the original credentials and pivot from CLI to console sessions. The detection rule is configured to trigger on specific conditions, particularly monitoring logs from AWS CloudTrail to identify unusual patterns in API usage related to the console login process while filtering out benign events associated with legitimate AWS SSO logins.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Logon Session
- Application Log
Created: 2024-02-26