Detect AWS Route Table Modification via CloudTrail
An attacker may add a new route to an AWS route table, potentially redirecting network traffic for malicious purposes such as defense impairment or data exfiltration.
The addition of a new route to an AWS route table can be a sign of malicious activity, especially if the route redirects traffic to an unexpected or unauthorized destination. This activity is typically logged in AWS CloudTrail. Attackers might add routes to intercept network traffic, conduct man-in-the-middle attacks, or impair defenses by routing traffic away from security appliances. Understanding who is performing this action and the destination of the new route is critical for identifying potential threats within an AWS environment.
Attack Chain
- An attacker gains unauthorized access to an AWS account, potentially through compromised credentials or an exploited vulnerability.
- The attacker uses the AWS CLI or the AWS Management Console to interact with the EC2 service.
- The attacker identifies the target route table to modify.
- The attacker executes the
CreateRouteAPI call, specifying the destination CIDR block and target (e.g., an internet gateway, virtual private gateway, or network interface). - CloudTrail logs the
CreateRouteevent, capturing details of the action, including the user identity, source IP address, and the route table modification. - Network traffic matching the new route’s destination CIDR block is now redirected to the attacker-controlled target.
- The attacker monitors and potentially modifies the redirected traffic for reconnaissance or data exfiltration purposes.
Impact
Successful modification of AWS route tables can lead to significant security breaches. An attacker could redirect critical network traffic to a malicious endpoint, enabling them to intercept sensitive data or disrupt services. This could lead to data breaches, financial loss, and reputational damage. The scope of the impact depends on the criticality of the redirected traffic and the attacker’s objectives.
Recommendation
- Deploy the “Detect AWS Route Table Modification via CloudTrail” Sigma rule to your SIEM and tune for your environment to detect suspicious route creation events in AWS CloudTrail logs.
- Investigate any
CreateRouteevents where the user identity is unexpected or the destination CIDR block and target are suspicious. - Monitor AWS CloudTrail logs for
CreateRouteevents and correlate them with other suspicious activities. - Implement strict IAM policies to limit who can modify route tables (reference the
eventSourceandeventNamefields in the rule below).
Detection coverage 2
Detect AWS Route Table Modification via CloudTrail
mediumDetects the addition of a new network route to a route table in AWS.
Detect Route Creation with Unusual Destination
highDetects route creation events with destination CIDR blocks outside the expected private IP ranges.
Detection queries are kept inside the platform. Get full rules →