<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AWS EC2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/aws-ec2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 Nov 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/aws-ec2/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detect AWS Route Table Modification via CloudTrail</title><link>https://feed.craftedsignal.io/briefs/2024-11-aws-route-added/</link><pubDate>Fri, 01 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-aws-route-added/</guid><description>An attacker may add a new route to an AWS route table, potentially redirecting network traffic for malicious purposes such as defense impairment or data exfiltration.</description><content:encoded><![CDATA[<p>The addition of a new route to an AWS route table can be a sign of malicious activity, especially if the route redirects traffic to an unexpected or unauthorized destination. This activity is typically logged in AWS CloudTrail. Attackers might add routes to intercept network traffic, conduct man-in-the-middle attacks, or impair defenses by routing traffic away from security appliances. Understanding who is performing this action and the destination of the new route is critical for identifying potential threats within an AWS environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an AWS account, potentially through compromised credentials or an exploited vulnerability.</li>
<li>The attacker uses the AWS CLI or the AWS Management Console to interact with the EC2 service.</li>
<li>The attacker identifies the target route table to modify.</li>
<li>The attacker executes the <code>CreateRoute</code> API call, specifying the destination CIDR block and target (e.g., an internet gateway, virtual private gateway, or network interface).</li>
<li>CloudTrail logs the <code>CreateRoute</code> event, capturing details of the action, including the user identity, source IP address, and the route table modification.</li>
<li>Network traffic matching the new route&rsquo;s destination CIDR block is now redirected to the attacker-controlled target.</li>
<li>The attacker monitors and potentially modifies the redirected traffic for reconnaissance or data exfiltration purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of AWS route tables can lead to significant security breaches. An attacker could redirect critical network traffic to a malicious endpoint, enabling them to intercept sensitive data or disrupt services. This could lead to data breaches, financial loss, and reputational damage. The scope of the impact depends on the criticality of the redirected traffic and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect AWS Route Table Modification via CloudTrail&rdquo; Sigma rule to your SIEM and tune for your environment to detect suspicious route creation events in AWS CloudTrail logs.</li>
<li>Investigate any <code>CreateRoute</code> events where the user identity is unexpected or the destination CIDR block and target are suspicious.</li>
<li>Monitor AWS CloudTrail logs for <code>CreateRoute</code> events and correlate them with other suspicious activities.</li>
<li>Implement strict IAM policies to limit who can modify route tables (reference the <code>eventSource</code> and <code>eventName</code> fields in the rule below).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>network-routing</category></item><item><title>New AWS Network ACL Entry Creation Detected</title><link>https://feed.craftedsignal.io/briefs/2024-10-aws-network-acl-created/</link><pubDate>Sat, 26 Oct 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-aws-network-acl-created/</guid><description>Detection of new Network ACL entries in AWS CloudTrail logs can indicate potential defense impairment or the opening of new attack vectors within an AWS account by an adversary.</description><content:encoded><![CDATA[<p>The creation of new Network Access Control List (ACL) entries in Amazon Web Services (AWS) environments can be a sign of malicious activity. While legitimate use cases exist, adversaries can leverage these ACL changes to impair existing defenses, create new pathways for lateral movement, or establish persistence mechanisms. This activity is logged by CloudTrail and can be monitored to identify unauthorized or suspicious modifications to network security configurations. Attackers could create overly permissive rules that allow unauthorized access to critical resources or restrictive rules that disrupt legitimate traffic. Monitoring the creation of Network ACL entries is important for maintaining the integrity and security of AWS environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised credentials or an exploited vulnerability.</li>
<li>The attacker identifies the existing Network ACLs within the target Virtual Private Cloud (VPC).</li>
<li>The attacker uses the AWS Management Console, CLI, or API to create a new Network ACL entry. The <code>CreateNetworkAclEntry</code> event is logged in CloudTrail.</li>
<li>The new ACL entry may be configured to allow specific inbound or outbound traffic that was previously blocked, effectively opening a new attack vector.</li>
<li>Alternatively, the new ACL entry may be configured to deny legitimate traffic, causing a denial-of-service condition for specific services or resources.</li>
<li>The attacker leverages the newly created ACL entry to move laterally within the AWS environment, accessing previously inaccessible resources.</li>
<li>The attacker performs malicious actions, such as data exfiltration or resource compromise, using the newly opened network pathways.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The creation of unauthorized Network ACL entries can have significant consequences. It can lead to the opening of new attack vectors, allowing unauthorized access to sensitive data and critical resources. In some scenarios, it can result in a denial-of-service condition, disrupting legitimate business operations. Depending on the scope of the compromised resources and data, the impact can range from minor inconvenience to significant financial loss and reputational damage. Early detection of this activity is crucial to mitigating potential risks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;New Network ACL Entry Added&rdquo; to your SIEM to detect suspicious ACL modifications (logsource: aws, service: cloudtrail).</li>
<li>Investigate any <code>CreateNetworkAclEntry</code> events that deviate from established baseline configurations or involve unexpected source/destination IP ranges.</li>
<li>Review and audit existing Network ACL configurations regularly to identify and remediate any overly permissive or restrictive rules.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts to reduce the risk of credential compromise and unauthorized access.</li>
<li>Monitor CloudTrail logs for other related events, such as <code>DeleteNetworkAclEntry</code> or <code>ReplaceNetworkAclEntry</code>, which may indicate further tampering with network security configurations.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1686.001</category><category>cloud</category></item></channel></rss>