<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>GuardDuty — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/guardduty/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 17:38:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/guardduty/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS GuardDuty Detector Deletion or Disablement</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-guardduty-disable/</link><pubDate>Wed, 03 Jan 2024 17:38:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-guardduty-disable/</guid><description>Attackers may delete or disable AWS GuardDuty detectors to impair defenses and evade detection of malicious activities within the AWS environment.</description><content:encoded><![CDATA[<p>Attackers with sufficient AWS privileges may attempt to disable or delete AWS GuardDuty detectors to evade detection. GuardDuty is a threat detection service that monitors AWS accounts for malicious activity. Disabling it allows attackers to operate with less chance of being detected. This activity may occur post-compromise as part of a broader defense evasion strategy, or as a precursor to malicious activities. The deletion or disabling of GuardDuty detectors should be considered a critical event, warranting immediate investigation to verify legitimacy. The references suggest that this behavior has been observed in the wild and is documented across multiple security vendors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account through compromised credentials or other means (T1078).</li>
<li>The attacker enumerates existing GuardDuty detectors to identify the target for disabling or deletion (T1068).</li>
<li>The attacker authenticates to the AWS API using stolen credentials or an assumed role with sufficient permissions.</li>
<li>The attacker calls the <code>DeleteDetector</code> API to remove the GuardDuty detector entirely, erasing all existing findings (T1685.002).</li>
<li>Alternatively, the attacker calls the <code>UpdateDetector</code> API to disable the detector by setting the <code>enable</code> parameter to <code>false</code> (T1685.002).</li>
<li>AWS CloudTrail logs the <code>DeleteDetector</code> or <code>UpdateDetector</code> event with a <code>Success</code> or <code>null</code> error code.</li>
<li>With GuardDuty disabled, the attacker performs malicious actions such as lateral movement, data exfiltration, or resource compromise without immediate detection.</li>
<li>The attacker attempts to remove CloudTrail logs to further impair defenses (T1562.008).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the complete loss of threat detection capabilities within the AWS environment. With GuardDuty disabled, malicious activities can go unnoticed, potentially leading to data breaches, unauthorized access, or resource compromise. The impact is significant because GuardDuty is a primary security control for many organizations using AWS. Depending on the attacker&rsquo;s objectives, this could result in financial loss, reputational damage, or compliance violations. The references suggest that this is a known technique used by attackers to evade detection in AWS environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS GuardDuty Detector Deleted Or Updated&rdquo; to your SIEM using AWS CloudTrail logs to detect attempts to disable or delete GuardDuty (logsource: aws, service: cloudtrail).</li>
<li>Investigate all instances of <code>DeleteDetector</code> and <code>UpdateDetector</code> events in CloudTrail, especially if initiated from unusual locations or IAM roles.</li>
<li>Implement multi-factor authentication (MFA) for all IAM users to reduce the risk of credential compromise (T1110).</li>
<li>Enforce the principle of least privilege by granting only necessary permissions to IAM roles (T1078).</li>
<li>Monitor CloudTrail logs for anomalies that could indicate malicious activity following a GuardDuty disablement.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-impairment</category><category>aws</category><category>cloudtrail</category></item></channel></rss>