heroui logo

Abnormally High Number Of Cloud Instances Launched

Splunk Security Content

View Source
Summary
The analytic rule titled 'Abnormally High Number Of Cloud Instances Launched' is designed to detect unusual patterns in cloud instance creation, specifically focusing on AWS environments. It employs cloud infrastructure logs, particularly AWS CloudTrail, to monitor and analyze the number of instances launched within a 4-hour window. By utilizing a probability density function generated from historical data, the rule identifies outliers indicative of potential unauthorized access or misuse of cloud resources. A spike in instance creation may signify malicious activity, such as an attacker exploiting the environment for cryptomining, resulting in cost increases or resource exhaustion. In practice, the detection works by aggregating instance launch events flagged as successful and categorizing them based on the time of day and the day of the week, helping to distinguish between typical and anomalous behavior. The output includes user identification, instance counts, and thresholds to assess severity, making it a critical alert for maintaining cloud security.
Categories
  • Cloud
Data Sources
  • Cloud Storage
ATT&CK Techniques
  • T1078.004
  • T1078
Created: 2024-11-14