Skip to content
Threat Feed

Product

CloudTrail

9 briefs RSS
high advisory

AWS Security Services Impairment via Deletion of Resources

Detection of adversaries attempting to impair or disable AWS security services by deleting resources across GuardDuty, AWS WAF, CloudWatch, Route 53, and CloudWatch Logs to evade detection and remove visibility.

CloudWatch +5 aws cloudtrail defense-evasion cloud
2r 1t
medium advisory

AWS CloudTrail Update for Defense Evasion

Attackers may attempt to evade detection by altering CloudTrail logging configurations, such as changing multi-regional logging to a single region, which impairs the logging of their activities and hinders incident response.

CloudTrail +4 aws defense-evasion cloud
2r 1t
high advisory

AWS CloudTrail Logging Stopped for Defense Evasion

Detection of AWS CloudTrail `StopLogging` events indicating potential defense evasion by adversaries attempting to operate undetected within a compromised AWS environment by halting the logging of their malicious activities.

CloudTrail +4 aws defense-evasion cloud
2r 1t 1i
high advisory

AWS CloudTrail Logging Stopped for Defense Evasion

Detection of AWS CloudTrail StopLogging events indicates a potential defense evasion attempt by an attacker to operate stealthily within a compromised AWS environment and hinder incident response.

Splunk Enterprise +3 aws cloudtrail defense-evasion aws-account
2r 1t
high advisory

AWS Bedrock Model Invocation Logging Deletion Attempt

Detection of attempts to delete AWS Bedrock model invocation logging configurations, potentially indicating an adversary trying to remove audit trails of model interactions after credential compromise, to hide malicious AI model usage.

CloudTrail +3 aws bedrock logging defense-evasion
2r 1t
high advisory

AWS S3 Bucket Lifecycle Rule Abuse for Log Deletion

Attackers may abuse the AWS S3 PutBucketLifecycle API to rapidly delete CloudTrail logs by setting short expiration periods on S3 buckets, hindering incident response and forensic investigations.

CloudTrail +3 aws defense-evasion
2r 1t
high advisory

AWS Network ACL Created with All Ports Open

The analytic detects the creation or replacement of AWS Network Access Control Lists (ACLs) with rules that allow all traffic from a specified CIDR block, potentially exposing the network to unauthorized access and increasing the risk of data breaches.

CloudTrail +5 aws network-acl misconfiguration cloud security-group
2r
high threat

AWS S3 Bucket Lifecycle Rule for Rapid Log Deletion

An attacker modifies an AWS S3 bucket lifecycle policy to rapidly expire CloudTrail logs, hindering incident response and forensic analysis.

exploited CloudTrail +4 aws defense_evasion s3
2r 1t
high advisory

AWS Bedrock GuardRails Deletion Attempt

Detection of AWS Bedrock GuardRails deletion, which are security controls to prevent harmful AI outputs, could indicate an adversary attempting to remove safety measures after credential compromise to enable malicious model outputs.

Bedrock +4 aws cloudtrail defense-evasion
2r 1t