heroui logo

Detect AWS enumeration of sensitive data

Anvilogic Forge

View Source
Summary
This detection rule is designed to identify potential enumeration activities within AWS environments, particularly when there is a risk of compromise. It tracks specific AWS API calls that attackers may use to gather sensitive information regarding users, roles, customer-managed policies, and groups. By leveraging CloudTrail logs, the rule looks for multiple instances of certain event names, namely 'ListUsers', 'ListRoles', 'ListPolicies', and 'ListGroups'. If the same source IP address makes more than one of these calls within a defined timeframe (60 seconds), it flags this behavior as suspicious. This is indicative of 'data collection' techniques, where an adversary may be gathering sensitive information prior to carrying out further malicious activities. The rule enriches event data with DNS resolution and geolocation information to provide clearer context on the source of the requests. Overall, this ensures timely detection of potentially malicious enumeration activities that could lead to further exploitation of the AWS environment.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
  • Cloud Service
  • Network Traffic
ATT&CK Techniques
  • T1530
Created: 2024-02-09