<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AWS GuardDuty — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/aws-guardduty/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/aws-guardduty/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS GuardDuty IP Set Manipulation for Defense Impairment</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-guardduty-ipset/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-guardduty-ipset/</guid><description>An attacker modifies AWS GuardDuty IP sets, potentially whitelisting malicious IPs to disable security alerts and impair defenses.</description><content:encoded><![CDATA[<p>An adversary may attempt to impair an organization&rsquo;s defenses by manipulating the IP sets within AWS GuardDuty. GuardDuty IP sets are used to whitelist trusted IPs or blacklist known malicious IPs. By modifying these lists, an attacker can effectively disable alerts for their malicious activity, allowing them to operate undetected within the AWS environment. This activity is typically performed after initial access and lateral movement, as the attacker seeks to maintain persistence and evade detection. The changes could be made via the AWS Management Console, CLI, or programmatically through the AWS API, making it difficult to immediately recognize the change as malicious.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the AWS environment through compromised credentials or an exposed IAM role.</li>
<li>The attacker enumerates existing GuardDuty IP sets using the <code>ListIPSets</code> API call to identify potential targets for modification.</li>
<li>The attacker creates a new IP set using <code>CreateIPSet</code> API call, which contains malicious IPs they intend to whitelist, or the legitimate IPs of internal scanners they wish to mimic.</li>
<li>GuardDuty validates the uploaded IP set list.</li>
<li>The attacker activates the newly created IP set within GuardDuty, making it the active trusted or threat list.</li>
<li>The attacker conducts malicious activity, such as lateral movement, data exfiltration, or resource exploitation, from the whitelisted IPs.</li>
<li>GuardDuty, configured with the modified IP sets, does not generate alerts for activity originating from the whitelisted IPs.</li>
<li>The attacker maintains persistence and achieves their objective (e.g., data theft, denial of service) without detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to significant data breaches, resource compromise, and prolonged unauthorized access. The modification of IP sets within GuardDuty directly impairs the ability of security teams to detect and respond to ongoing threats. By whitelisting malicious IPs, attackers can bypass security controls and operate freely within the AWS environment. The number of affected organizations depends on the scope of the compromised AWS accounts and the extent to which GuardDuty is relied upon for threat detection.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS GuardDuty IP Set Creation&rdquo; to your SIEM to detect suspicious creation of IP sets in GuardDuty (logsource: aws, service: cloudtrail).</li>
<li>Investigate any changes to GuardDuty configurations, particularly the creation or modification of IP sets, using CloudTrail logs.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts and IAM roles to prevent unauthorized access (related to initial access).</li>
<li>Regularly review and audit IAM roles and permissions to minimize the blast radius of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-impairment</category><category>aws</category></item></channel></rss>