<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CloudWatch Logs — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/cloudwatch-logs/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/cloudwatch-logs/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS Security Services Impairment via Deletion of Resources</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-security-service-impairment/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-security-service-impairment/</guid><description>Detection of adversaries attempting to impair or disable AWS security services by deleting resources across GuardDuty, AWS WAF, CloudWatch, Route 53, and CloudWatch Logs to evade detection and remove visibility.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of malicious attempts to impair or disable AWS security services through the deletion of critical resources. Attackers target services like GuardDuty, AWS WAF (classic and v2), CloudWatch, Route 53, and CloudWatch Logs to evade detection and remove visibility. The primary objective is to create blind spots within the AWS environment, allowing attackers to operate undetected. The activity is identified through specific API calls logged in CloudTrail, such as &ldquo;DeleteLogStream&rdquo; and &ldquo;DeleteDetector.&rdquo; This targeted approach significantly reduces the noise and ensures that only security-related deletions are flagged, enhancing the accuracy of the detection. Successful evasion can lead to privilege escalation or data exfiltration without triggering security alerts, severely compromising the AWS environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the AWS environment is achieved through compromised credentials or a misconfigured IAM role.</li>
<li>The attacker enumerates existing security services, including GuardDuty, AWS WAF, CloudWatch, Route 53, and CloudWatch Logs, to identify potential targets for impairment.</li>
<li>The attacker uses AWS CLI or API calls to attempt to delete GuardDuty detectors using <code>DeleteDetector</code> against <code>guardduty.amazonaws.com</code>.</li>
<li>The attacker attempts to delete WAF rules, IP sets, or rule groups using <code>DeleteIPSet</code>, <code>DeleteWebACL</code>, <code>DeleteRuleGroup</code>, or <code>DeleteRule</code> API calls targeting <code>wafv2.amazonaws.com</code> or <code>waf.amazonaws.com</code>.</li>
<li>The attacker attempts to delete CloudWatch logging configurations via the <code>DeleteLoggingConfiguration</code> API call from <code>wafv2.amazonaws.com</code>, <code>waf.amazonaws.com</code>, or <code>route53.amazonaws.com</code>.</li>
<li>The attacker might attempt to delete CloudWatch alarms using the <code>DeleteAlarms</code> event.</li>
<li>If successful, the attacker disables critical security monitoring and logging functions, creating blind spots for defenders.</li>
<li>The attacker leverages the compromised environment to escalate privileges, move laterally, exfiltrate data, or deploy persistent backdoors without triggering security alerts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack can severely compromise the security posture of the AWS environment. By disabling security services like GuardDuty and CloudWatch, attackers can operate undetected, escalate privileges, and exfiltrate sensitive data without triggering security alerts. The scope of the impact depends on the attacker&rsquo;s objectives, the sensitivity of the data, and the extent of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable AWS CloudTrail logging across all regions in your AWS environment to capture API calls and events necessary for detection.</li>
<li>Deploy the Sigma rule <code>AWS Defense Evasion via Security Service Deletion</code> to your SIEM and tune for your environment using <code>user_agent</code> and <code>user_arn</code> fields.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the user accounts involved and the specific resources being deleted.</li>
<li>Regularly review and validate the configurations of your AWS security services, including GuardDuty detectors, WAF rules, and CloudWatch alarms, to ensure they are properly configured and protected from unauthorized deletion.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts, especially those with administrative privileges, to reduce the risk of credential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>defense-evasion</category><category>cloud</category></item></channel></rss>