AWS IAM User or Access Key Creation via S3 Browser
The use of S3 Browser to create IAM users or access keys in AWS environments indicates a potential privilege escalation, persistence, or initial access attempt by threat actors leveraging a known cloud administration tool.
The S3 Browser utility, a Windows-based client for managing Amazon S3 storage and other cloud services, can be abused by threat actors to create new IAM users or access keys within compromised AWS environments. This activity, if unauthorized, can lead to privilege escalation, persistence, or even initial access, depending on the context of the compromise. The use of S3 Browser is identifiable via the userAgent string in AWS CloudTrail logs. While legitimate use of S3 Browser for administrative tasks exists, its unexpected appearance in user activity, particularly in sensitive accounts, should be investigated. This activity is particularly concerning because it can allow attackers to establish a foothold in the cloud environment and move laterally.
Attack Chain
- An attacker gains initial access to an AWS environment, potentially through compromised credentials or an exploited vulnerability.
- The attacker installs and configures S3 Browser on a compromised host or uses an existing installation.
- The attacker authenticates S3 Browser to the AWS environment using existing compromised credentials or an assumed role.
- The attacker uses S3 Browser to execute the
CreateUserAPI call within AWS IAM. - The attacker configures the new IAM user with elevated privileges, potentially granting administrator access.
- Alternatively, the attacker uses S3 Browser to execute the
CreateAccessKeyAPI call for an existing IAM user. - The attacker uses the newly created access key to perform actions within the AWS environment.
- The attacker leverages the new user or access key for persistence, lateral movement, and data exfiltration within the AWS environment.
Impact
Successful exploitation and IAM creation can lead to complete compromise of the AWS environment. An attacker with escalated privileges can access sensitive data, modify configurations, disrupt services, and deploy malicious infrastructure. Depending on the permissions granted to the created user or access key, the attacker could potentially pivot to other AWS accounts or services, leading to widespread damage. This can result in significant financial losses, reputational damage, and regulatory penalties.
Recommendation
- Deploy the Sigma rule “AWS IAM S3Browser User or AccessKey Creation” to your SIEM and tune for your environment to detect anomalous IAM activity originating from S3 Browser.
- Investigate any instances of
CreateUserorCreateAccessKeyevents in AWS CloudTrail logs where theuserAgentcontains “S3 Browser”. - Implement multi-factor authentication (MFA) for all IAM users to mitigate the risk of credential compromise.
- Review and enforce the principle of least privilege for all IAM users and roles to limit the impact of compromised credentials.
Detection coverage 2
AWS IAM User Creation via S3 Browser
highDetects the creation of IAM users in AWS environments via the S3 Browser utility, potentially indicating malicious activity.
AWS IAM Access Key Creation via S3 Browser
highDetects the creation of IAM access keys in AWS environments via the S3 Browser utility, potentially indicating malicious activity.
Detection queries are kept inside the platform. Get full rules →