heroui logo

Potential Amazon SSM Agent Hijacking

Sigma Rules

View Source
Summary
This detection rule identifies potential hijacking attempts of the Amazon Simple Systems Manager (SSM) Agent on Windows systems. According to research by Mitiga, attackers can exploit the SSM Agent to gain persistent access and control over AWS instances, essentially using it as a Remote Access Trojan (RAT). The rule focuses on the process creation of 'amazon-ssm-agent.exe' and monitors command-line arguments associated with registration and region specification, which can indicate malicious behavior if executed unlawfully. Given the nature of this threat, it is critical for organizations using AWS services to have a response plan in place for potential breaches leveraging legitimate tools against their security.
Categories
  • Cloud
  • AWS
  • Windows
Data Sources
  • Process
Created: 2023-08-02