Bitbucket Audit Log Configuration Modified
An attacker may modify the Bitbucket audit log configuration to impair security monitoring and evade detection.
Attackers may target Bitbucket audit log configurations to reduce or eliminate logging, thereby hindering incident response and forensic investigations. Modifying audit settings is a defense evasion technique that allows malicious actors to operate with less visibility. This activity typically occurs post-compromise. This brief focuses on detecting such modifications. Visibility of audit events requires at least “Basic” log level configuration.
Attack Chain
- An attacker gains unauthorized access to a Bitbucket instance, potentially through compromised credentials or exploiting a vulnerability.
- The attacker authenticates to the Bitbucket web interface or uses the Bitbucket API.
- The attacker navigates to the audit log configuration settings within the Bitbucket administration panel.
- The attacker modifies the audit log settings, such as disabling logging for specific event categories or reducing the log retention period.
- The Bitbucket server processes the configuration change request.
- Audit events related to the configuration change are logged (if auditing is still enabled for such events).
- The attacker performs malicious activities, such as creating unauthorized repositories or exfiltrating source code, with reduced risk of detection.
Impact
Successful modification of the Bitbucket audit log configuration allows attackers to operate with significantly reduced visibility. This can lead to delayed detection of breaches, prolonged dwell time, and increased data exfiltration. Without proper audit logging, organizations will struggle to identify the scope and impact of a compromise.
Recommendation
- Deploy the “Bitbucket Audit Log Configuration Updated” Sigma rule to your SIEM to detect changes to audit log configurations (logsource: bitbucket, service: audit).
- Ensure Bitbucket audit logging is enabled at the “Basic” level or higher, as lower levels may not capture configuration changes (logsource: bitbucket, service: audit).
- Investigate any detected instances of audit log configuration changes to determine if they are authorized (Sigma rule: “Bitbucket Audit Log Configuration Updated”).
Detection coverage 2
Bitbucket Audit Log Configuration Updated
mediumDetects changes to the Bitbucket audit log configuration.
Bitbucket Audit Log Disabled
highDetects when Bitbucket audit logging is disabled.
Detection queries are kept inside the platform. Get full rules →