AWS GuardDuty Detector Deletion or Disablement
Attackers may delete or disable AWS GuardDuty detectors to impair defenses and evade detection of malicious activities within the AWS environment.
Attackers with sufficient AWS privileges may attempt to disable or delete AWS GuardDuty detectors to evade detection. GuardDuty is a threat detection service that monitors AWS accounts for malicious activity. Disabling it allows attackers to operate with less chance of being detected. This activity may occur post-compromise as part of a broader defense evasion strategy, or as a precursor to malicious activities. The deletion or disabling of GuardDuty detectors should be considered a critical event, warranting immediate investigation to verify legitimacy. The references suggest that this behavior has been observed in the wild and is documented across multiple security vendors.
Attack Chain
- An attacker gains initial access to an AWS account through compromised credentials or other means (T1078).
- The attacker enumerates existing GuardDuty detectors to identify the target for disabling or deletion (T1068).
- The attacker authenticates to the AWS API using stolen credentials or an assumed role with sufficient permissions.
- The attacker calls the
DeleteDetectorAPI to remove the GuardDuty detector entirely, erasing all existing findings (T1685.002). - Alternatively, the attacker calls the
UpdateDetectorAPI to disable the detector by setting theenableparameter tofalse(T1685.002). - AWS CloudTrail logs the
DeleteDetectororUpdateDetectorevent with aSuccessornullerror code. - With GuardDuty disabled, the attacker performs malicious actions such as lateral movement, data exfiltration, or resource compromise without immediate detection.
- The attacker attempts to remove CloudTrail logs to further impair defenses (T1562.008).
Impact
A successful attack can lead to the complete loss of threat detection capabilities within the AWS environment. With GuardDuty disabled, malicious activities can go unnoticed, potentially leading to data breaches, unauthorized access, or resource compromise. The impact is significant because GuardDuty is a primary security control for many organizations using AWS. Depending on the attacker’s objectives, this could result in financial loss, reputational damage, or compliance violations. The references suggest that this is a known technique used by attackers to evade detection in AWS environments.
Recommendation
- Deploy the Sigma rule “AWS GuardDuty Detector Deleted Or Updated” to your SIEM using AWS CloudTrail logs to detect attempts to disable or delete GuardDuty (logsource: aws, service: cloudtrail).
- Investigate all instances of
DeleteDetectorandUpdateDetectorevents in CloudTrail, especially if initiated from unusual locations or IAM roles. - Implement multi-factor authentication (MFA) for all IAM users to reduce the risk of credential compromise (T1110).
- Enforce the principle of least privilege by granting only necessary permissions to IAM roles (T1078).
- Monitor CloudTrail logs for anomalies that could indicate malicious activity following a GuardDuty disablement.
Detection coverage 3
AWS GuardDuty Detector Deletion
highDetects successful deletion of an AWS GuardDuty detector.
AWS GuardDuty Detector Disablement via UpdateDetector
highDetects disabling of an AWS GuardDuty detector using the UpdateDetector API.
AWS GuardDuty Detector Update Event
lowDetects any updates to an AWS GuardDuty detector.
Detection queries are kept inside the platform. Get full rules →