<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CloudWatch — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/cloudwatch/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/cloudwatch/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS Security Services Impairment via Deletion of Resources</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-security-service-impairment/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-security-service-impairment/</guid><description>Detection of adversaries attempting to impair or disable AWS security services by deleting resources across GuardDuty, AWS WAF, CloudWatch, Route 53, and CloudWatch Logs to evade detection and remove visibility.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of malicious attempts to impair or disable AWS security services through the deletion of critical resources. Attackers target services like GuardDuty, AWS WAF (classic and v2), CloudWatch, Route 53, and CloudWatch Logs to evade detection and remove visibility. The primary objective is to create blind spots within the AWS environment, allowing attackers to operate undetected. The activity is identified through specific API calls logged in CloudTrail, such as &ldquo;DeleteLogStream&rdquo; and &ldquo;DeleteDetector.&rdquo; This targeted approach significantly reduces the noise and ensures that only security-related deletions are flagged, enhancing the accuracy of the detection. Successful evasion can lead to privilege escalation or data exfiltration without triggering security alerts, severely compromising the AWS environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the AWS environment is achieved through compromised credentials or a misconfigured IAM role.</li>
<li>The attacker enumerates existing security services, including GuardDuty, AWS WAF, CloudWatch, Route 53, and CloudWatch Logs, to identify potential targets for impairment.</li>
<li>The attacker uses AWS CLI or API calls to attempt to delete GuardDuty detectors using <code>DeleteDetector</code> against <code>guardduty.amazonaws.com</code>.</li>
<li>The attacker attempts to delete WAF rules, IP sets, or rule groups using <code>DeleteIPSet</code>, <code>DeleteWebACL</code>, <code>DeleteRuleGroup</code>, or <code>DeleteRule</code> API calls targeting <code>wafv2.amazonaws.com</code> or <code>waf.amazonaws.com</code>.</li>
<li>The attacker attempts to delete CloudWatch logging configurations via the <code>DeleteLoggingConfiguration</code> API call from <code>wafv2.amazonaws.com</code>, <code>waf.amazonaws.com</code>, or <code>route53.amazonaws.com</code>.</li>
<li>The attacker might attempt to delete CloudWatch alarms using the <code>DeleteAlarms</code> event.</li>
<li>If successful, the attacker disables critical security monitoring and logging functions, creating blind spots for defenders.</li>
<li>The attacker leverages the compromised environment to escalate privileges, move laterally, exfiltrate data, or deploy persistent backdoors without triggering security alerts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack can severely compromise the security posture of the AWS environment. By disabling security services like GuardDuty and CloudWatch, attackers can operate undetected, escalate privileges, and exfiltrate sensitive data without triggering security alerts. The scope of the impact depends on the attacker&rsquo;s objectives, the sensitivity of the data, and the extent of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable AWS CloudTrail logging across all regions in your AWS environment to capture API calls and events necessary for detection.</li>
<li>Deploy the Sigma rule <code>AWS Defense Evasion via Security Service Deletion</code> to your SIEM and tune for your environment using <code>user_agent</code> and <code>user_arn</code> fields.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the user accounts involved and the specific resources being deleted.</li>
<li>Regularly review and validate the configurations of your AWS security services, including GuardDuty detectors, WAF rules, and CloudWatch alarms, to ensure they are properly configured and protected from unauthorized deletion.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts, especially those with administrative privileges, to reduce the risk of credential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>defense-evasion</category><category>cloud</category></item><item><title>AWS Security Services Configuration Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-security-services-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-security-services-deletion/</guid><description>Detection of deletion of critical AWS Security Services configurations like CloudWatch alarms, GuardDuty detectors, and Web Application Firewall rules to evade detection, potentially leading to data breaches and unauthorized access.</description><content:encoded><![CDATA[<p>This threat brief addresses the tactic of adversaries deleting critical AWS security service configurations to evade detection. This includes deleting CloudWatch alarms, GuardDuty detectors, and Web Application Firewall (WAF) rules. The activity is identified through specific API calls such as &ldquo;DeleteLogStream&rdquo;, &ldquo;DeleteDetector&rdquo;, &ldquo;DeleteIPSet&rdquo;, &ldquo;DeleteWebACL&rdquo;, &ldquo;DeleteRule&rdquo;, &ldquo;DeleteRuleGroup&rdquo;, &ldquo;DeleteLoggingConfiguration&rdquo;, and &ldquo;DeleteAlarms&rdquo; within Amazon Security Lake logs. By successfully removing or impairing these services, attackers can operate undetected within an AWS environment, increasing the risk of data breaches, unauthorized access, and persistent compromise. The scope includes any AWS environment utilizing the mentioned security services and logging via Amazon Security Lake.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the AWS environment, potentially through compromised credentials or exploiting a vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to obtain the necessary permissions to modify or delete security service configurations.</li>
<li><strong>Discovery:</strong> The attacker enumerates existing security configurations, such as CloudWatch alarms, GuardDuty detectors, and WAF rules, to identify targets for deletion.</li>
<li><strong>Defense Evasion - Service Deletion:</strong> The attacker executes API calls like <code>DeleteLogStream</code>, <code>DeleteDetector</code>, <code>DeleteIPSet</code>, <code>DeleteWebACL</code>, <code>DeleteRule</code>, <code>DeleteRuleGroup</code>, <code>DeleteLoggingConfiguration</code>, or <code>DeleteAlarms</code> to delete security service configurations.</li>
<li><strong>Persistence:</strong> With security monitoring impaired, the attacker establishes persistence mechanisms, such as creating new IAM users or roles with excessive permissions, or deploying backdoors within EC2 instances.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally through the AWS environment, accessing sensitive data and resources.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrates sensitive data from the compromised AWS environment.</li>
<li><strong>Impact:</strong> The attacker achieves their objective, which could include data theft, disruption of services, or financial gain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of AWS security services can have severe consequences, potentially affecting any organization using AWS. Consequences range from data breaches and unauthorized resource access to prolonged persistence of malicious actors within the AWS environment. The number of affected victims and the scope of damage depends on the scale of the AWS environment and the sensitivity of the data stored within. Organizations in all sectors are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect the deletion of critical AWS security service configurations based on Amazon Security Lake logs.</li>
<li>Investigate any identified instances of API calls related to the deletion of security services (e.g., &ldquo;DeleteLogStream&rdquo;, &ldquo;DeleteDetector&rdquo;) using the provided Sigma rule.</li>
<li>Implement multi-factor authentication (MFA) for all IAM users and roles to reduce the risk of compromised credentials.</li>
<li>Review and restrict IAM policies to ensure that users and roles have only the necessary permissions to perform their duties.</li>
<li>Monitor CloudTrail logs for unusual activity, such as unexpected API calls or changes to IAM policies.</li>
<li>Regularly audit AWS security configurations to ensure that they are properly configured and maintained.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>defense-evasion</category><category>security-service</category></item><item><title>AWS CloudWatch Log Group Deletion for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-cloudwatch-log-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-cloudwatch-log-deletion/</guid><description>Detection of AWS CloudWatch log group deletions via CloudTrail logs, excluding console-based actions, indicating potential defense evasion by attackers attempting to hide their tracks.</description><content:encoded><![CDATA[<p>Attackers may delete CloudWatch log groups to remove evidence of their activities within an AWS environment. This action, identified through <code>DeleteLogGroup</code> events in CloudTrail, allows them to evade detection and forensic analysis. The activity is detected by monitoring CloudTrail logs for successful log group deletions, excluding those initiated from the AWS console. This behavior is significant because it directly undermines the logging and monitoring infrastructure that defenders rely on for incident response and threat hunting. The original Splunk ES-CU analytic was published in 2026-05-05, but the underlying technique is still relevant.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an AWS account.</li>
<li>The attacker enumerates existing CloudWatch log groups using AWS CLI or API calls to identify potential targets for deletion.</li>
<li>The attacker uses compromised credentials or a compromised IAM role to execute the <code>DeleteLogGroup</code> API call via AWS CLI, SDK, or API.</li>
<li>CloudTrail logs the <code>DeleteLogGroup</code> event with <code>eventSource = logs.amazonaws.com</code> and a successful <code>errorCode</code>.</li>
<li>The attacker may repeat this process for multiple log groups to eliminate a broader range of forensic data.</li>
<li>The CloudWatch log group is permanently deleted, removing any logs it contained from the defender&rsquo;s visibility.</li>
<li>The attacker continues their malicious activities, now with reduced risk of detection due to the absence of relevant logs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of CloudWatch log groups allows attackers to operate with significantly reduced visibility. This can lead to delayed incident detection and response, increased dwell time, and greater potential for data exfiltration or system compromise. The deletion of logs hampers forensic investigations, making it difficult to determine the scope and impact of the attack. In environments with strict compliance requirements, such as those governed by HIPAA or PCI DSS, this can lead to significant penalties and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS CloudWatch Log Group Deletion&rdquo; to your SIEM to detect unauthorized log group deletions using <code>eventName = DeleteLogGroup</code> and <code>eventSource = logs.amazonaws.com</code>.</li>
<li>Enable AWS CloudTrail logging to capture <code>DeleteLogGroup</code> events within your AWS environment.</li>
<li>Investigate any detected <code>DeleteLogGroup</code> events, especially those not initiated from the AWS console (<code>userAgent !=console.amazonaws.com</code>), as potential indicators of malicious activity.</li>
<li>Implement strict IAM policies to limit the ability to delete CloudWatch log groups to only authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloudwatch</category><category>defense-evasion</category></item></channel></rss>