
Summary
This rule is designed to detect the use of the S3 Browser utility for reconnaissance against AWS IAM (Identity and Access Management) users. The primary focus is on identifying any attempts to list IAM users that do not have a LoginProfile. A LoginProfile allows users to have a password for accessing the AWS Management Console. Once the S3 Browser identifies such users, it attempts to create a LoginProfile for them. The detection relies on monitoring AWS CloudTrail logs for specific API actions related to LoginProfiles, specifically 'GetLoginProfile' to check existing profiles and 'CreateLoginProfile' to create new ones. The user agent must contain 'S3 Browser' to trigger this rule. The activities detected can indicate insider threats or malicious intent by external actors attempting to gain unauthorized access to AWS resources. This behavior falls within the MITRE ATT&CK framework categories attack.execution and attack.persistence, with specific Tactics and Techniques associated with credential dumping and valid accounts usage.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Application Log
Created: 2023-05-17