<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Amazon Web Services — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/amazon-web-services/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 20:57:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/amazon-web-services/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS EC2 Role GetCallerIdentity from New Source AS Organization</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-aws-ec2-role-getcalleridentity/</link><pubDate>Fri, 01 May 2026 20:57:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-aws-ec2-role-getcalleridentity/</guid><description>The rule detects when an EC2 instance role session calls AWS STS GetCallerIdentity from a new source autonomous system (AS) organization name, indicating potential credential theft and verification from outside expected egress paths.</description><content:encoded><![CDATA[<p>This detection identifies when an EC2 instance role session calls the AWS STS GetCallerIdentity API from a source Autonomous System (AS) Organization name that has not been previously observed. The GetCallerIdentity API is often used by adversaries to validate stolen instance role credentials from infrastructure outside the victim&rsquo;s normal egress points. By baselining the combination of identity and source network, the rule reduces noise associated with stable NAT or AWS-classified egress, focusing on truly novel access patterns. This detection is specifically designed to complement other rules that may detect general GetCallerIdentity calls, by excluding previously seen combinations of user identity and source AS organization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an EC2 instance through methods like exploiting a Server-Side Request Forgery (SSRF) vulnerability, compromising application code or exploiting IMDS abuse.</li>
<li>The attacker leverages the instance&rsquo;s IAM role to obtain temporary AWS credentials.</li>
<li>The attacker attempts to validate the stolen credentials using the <code>GetCallerIdentity</code> API call.</li>
<li>The <code>GetCallerIdentity</code> API call originates from an IP address associated with a new and unexpected Autonomous System Organization (ASO).</li>
<li>The AWS CloudTrail logs record the <code>GetCallerIdentity</code> event, including the user identity ARN and the source AS organization name.</li>
<li>The detection rule triggers due to the new combination of user identity and source AS organization.</li>
<li>The attacker uses the validated credentials to perform reconnaissance and identify valuable resources within the AWS environment (e.g., S3 buckets, databases).</li>
<li>The attacker attempts to exfiltrate sensitive data or deploy malicious workloads using the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data stored within the AWS environment. The attacker may be able to escalate privileges, compromise other resources, and disrupt services. The potential impact includes data breaches, financial loss, and reputational damage. The lack of specific victim counts or sectors targeted suggests a broad applicability across various AWS users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS EC2 Role GetCallerIdentity from New Source AS Organization&rdquo; to your SIEM to detect suspicious activity.</li>
<li>Investigate alerts triggered by the Sigma rule, focusing on the <code>aws.cloudtrail.user_identity.arn</code> and <code>source.as.organization.name</code> fields.</li>
<li>Monitor AWS CloudTrail logs for <code>GetCallerIdentity</code> API calls, particularly those originating from unfamiliar source IP addresses and ASNs.</li>
<li>Revoke compromised IAM role sessions by stopping the affected EC2 instances or removing the role from the instance profile.</li>
<li>Rotate any long-lived secrets accessible by the EC2 instance, based on the <code>aws.cloudtrail.user_identity.access_key_id</code>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>getcalleridentity</category><category>ec2</category><category>discovery</category></item><item><title>AWS Discovery API Calls from VPN ASN by New Identity</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-vpn-discovery/</link><pubDate>Fri, 01 May 2026 20:57:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-vpn-discovery/</guid><description>This rule detects the initial use of AWS discovery APIs from VPN-associated ASNs by a previously unseen identity, indicating potential reconnaissance activity.</description><content:encoded><![CDATA[<p>This detection identifies the first-time occurrence of an IAM principal invoking discovery APIs from a source IP address associated with a known VPN autonomous system number (ASN). The rule focuses on high-signal discovery actions, such as credential checks, account enumeration, bucket inventory, compute inventory, and logging introspection within AWS CloudTrail logs. The goal is to detect potential reconnaissance activities originating from anonymizing networks, which may indicate malicious intent. The rule specifically omits broad <code>List*</code> and <code>Describe*</code> patterns to reduce false positives, focusing instead on a curated list of ASNs commonly associated with VPN providers and hosting services. It&rsquo;s important to validate ASN data using local intelligence and tailor the <code>event.action</code> list based on your environment&rsquo;s baseline. Hosting ASNs are dual-use and require careful monitoring.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to AWS credentials, possibly through compromised credentials or misconfigured IAM roles.</li>
<li>The attacker initiates a VPN connection to mask their origin and evade geographic restrictions or monitoring. The VPN endpoint&rsquo;s ASN belongs to a known VPN provider.</li>
<li>Using the compromised credentials and VPN connection, the attacker calls the AWS API to execute <code>GetCallerIdentity</code> to validate access.</li>
<li>The attacker enumerates IAM users and roles using <code>ListUsers</code> and <code>ListRoles</code> to map out the AWS environment&rsquo;s identity landscape.</li>
<li>The attacker inventories S3 buckets using <code>ListBuckets</code> to identify potential targets for data exfiltration or manipulation.</li>
<li>The attacker gathers information about EC2 instances, VPCs, and security groups using <code>DescribeInstances</code>, <code>DescribeVpcs</code>, and <code>DescribeSecurityGroups</code> to understand the network infrastructure.</li>
<li>The attacker lists available Lambda functions using <code>ListFunctions</code> to discover potential code execution opportunities.</li>
<li>The attacker collects logging configurations by calling <code>DescribeTrails</code> to identify logging gaps.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging these discovery techniques can lead to unauthorized access to sensitive data, privilege escalation, and lateral movement within the AWS environment. By mapping out the cloud infrastructure, attackers can identify vulnerabilities and misconfigurations to exploit. Compromised AWS environments can result in data breaches, service disruptions, and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>AWS Discovery API Calls from VPN ASN by New Identity</code> to detect anomalous discovery activity originating from VPN ASNs.</li>
<li>Review the curated list of VPN-oriented ASNs within the rule query and update it with local intelligence from sources like RIPE, BGPView, or PeeringDB.</li>
<li>Enable AWS CloudTrail logs to capture the necessary event data for the Sigma rule to function effectively.</li>
<li>Tune the Sigma rule&rsquo;s <code>event.action</code> filter to include additional discovery-related API calls relevant to your environment, based on baseline analysis.</li>
<li>Investigate alerts generated by the Sigma rule by examining <code>aws.cloudtrail.user_identity.arn</code>, <code>event.action</code>, <code>event.provider</code>, <code>source.ip</code>, and <code>source.as.organization.name</code>.</li>
<li>Implement automated response actions, such as revoking sessions or rotating keys, when unexpected discovery activity is detected from VPN ASNs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>discovery</category><category>vpn</category></item><item><title>AWS IAM Customer Managed Policy Version Manipulation for Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-iam-policy-manipulation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-iam-policy-manipulation/</guid><description>Successful creation of new or setting default versions of customer-managed IAM policies can indicate privilege escalation attempts by attackers modifying policy permissions.</description><content:encoded><![CDATA[<p>This detection identifies potentially malicious activity related to AWS Identity and Access Management (IAM) policies. Specifically, it focuses on the creation of new versions of customer-managed policies (<code>CreatePolicyVersion</code>) and the modification of the default version (<code>SetDefaultPolicyVersion</code>). Attackers who have compromised IAM users or roles with sufficient permissions (iam:CreatePolicyVersion or iam:SetDefaultPolicyVersion) can use these actions to escalate their privileges within the AWS environment. By introducing a more permissive policy version and setting it as the default, attackers can gain unauthorized access to resources and perform actions that would otherwise be restricted. This activity is especially concerning when the modified policies are attached to highly privileged roles or users, such as those used for administrative tasks or break-glass scenarios.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises an IAM user or role with permissions to modify IAM policies (<code>iam:CreatePolicyVersion</code> or <code>iam:SetDefaultPolicyVersion</code>).</li>
<li>The attacker identifies a customer-managed policy attached to a high-privilege role or user.</li>
<li>The attacker crafts a new policy version with overly permissive rules, such as wildcard actions and resources.</li>
<li>The attacker uses the <code>CreatePolicyVersion</code> API call to upload the malicious policy version to the target policy.</li>
<li>Alternatively, the attacker uses the <code>SetDefaultPolicyVersion</code> API call to set a pre-existing, but less restrictive, policy version as the default.</li>
<li>The compromised IAM user or role assumes the high-privilege role targeted in step 2.</li>
<li>The attacker gains elevated privileges based on the modified IAM policy.</li>
<li>The attacker performs unauthorized actions within the AWS environment, such as accessing sensitive data, modifying infrastructure, or creating new resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to significant privilege escalation, allowing attackers to gain control over critical AWS resources and data. The number of affected users and roles depends on the scope of the compromised policy and its attachments. The consequences can include data breaches, service disruptions, and financial losses. In environments where IAM policies are not closely monitored, attackers may be able to maintain their elevated access for extended periods, further compounding the damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS IAM Customer Managed Policy Version Created or Default Version Set&rdquo; to your SIEM to detect suspicious policy modifications. Tune the rule based on your organization&rsquo;s baseline activity.</li>
<li>Review <code>aws.cloudtrail.request_parameters</code> logs to identify the <code>policyArn</code> and <code>policyDocument</code> associated with the policy changes detected by the rule.</li>
<li>Implement strong IAM governance practices, including the principle of least privilege and regular reviews of policy permissions, to minimize the impact of policy manipulation.</li>
<li>Monitor CloudTrail logs for <code>AttachUserPolicy</code>, <code>AttachRolePolicy</code>, or <code>CreatePolicyVersion</code> spikes from the same principal as detected policy modifications.</li>
<li>Enable MFA for all IAM users, especially those with permissions to manage IAM policies.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>aws</category><category>iam</category></item></channel></rss>