<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Kubectl — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/kubectl/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/kubectl/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multi-Cloud CLI Token and Credential Access via Command-Line Harvesting</title><link>https://feed.craftedsignal.io/briefs/2024-01-multi-cloud-cli-token-harvesting/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-multi-cloud-cli-token-harvesting/</guid><description>This rule detects command-line activity indicative of credential access across multiple cloud platforms (GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, Kubernetes), looking for specific commands used to print or access tokens and credentials, flagging hosts where multiple cloud targets are accessed within a five-minute window, suggesting potential credential harvesting activity.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting command-line credential harvesting across multiple cloud platforms. Attackers may attempt to steal application access tokens or extract credentials from files by executing specific commands via command-line interfaces (CLIs) for GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, and Kubernetes. This activity is particularly concerning when originating from the same host within a short time frame (e.g., five minutes), potentially indicating automated credential theft. This technique can lead to unauthorized access to cloud resources, data breaches, and lateral movement within cloud environments. Defenders should monitor for suspicious command-line activity involving cloud CLIs and credential access patterns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly via compromised credentials or exploiting a vulnerability.</li>
<li>The attacker uses a shell (cmd.exe, PowerShell, bash, etc.) to execute cloud CLI commands.</li>
<li>The attacker executes commands to list available credentials or tokens (e.g., <code>aws configure list</code>, <code>az account list</code>, <code>kubectl config view</code>).</li>
<li>The attacker executes commands to print access tokens for various cloud providers (e.g., <code>gcloud auth print-access-token</code>, <code>az account get-access-token</code>, <code>gh auth token</code>).</li>
<li>The attacker uses credential harvesting commands across multiple cloud platforms within a short timeframe.</li>
<li>The attacker exfiltrates the harvested credentials to a remote location.</li>
<li>The attacker uses the stolen credentials to access sensitive cloud resources and data.</li>
<li>The attacker performs lateral movement within the cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive cloud resources, data breaches, and lateral movement within cloud environments. The impact includes potential data exfiltration, service disruption, and financial loss. The number of affected victims will depend on the scope of the compromised credentials and the attacker&rsquo;s ability to exploit them.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Multi-Cloud CLI Token and Credential Access Commands&rdquo; to your SIEM to detect suspicious command-line activity related to cloud credential harvesting.</li>
<li>Review <code>Esql.process_command_line_values</code> in the rule output to identify the exact commands executed and determine if the activity was legitimate or malicious.</li>
<li>Correlate the detected activity with authentication, Kubernetes audit, and cloud API logs to confirm unauthorized access and misuse of printed tokens.</li>
<li>Implement monitoring and alerting for unusual CLI activity originating from user workstations or build servers, focusing on the CLIs mentioned in the Overview section.</li>
<li>Follow vendor-specific guidance to revoke compromised credentials, such as revoking tokens and rotating secrets, as outlined in the rule&rsquo;s &ldquo;Response and remediation&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>cloud</category><category>cli</category><category>token-harvesting</category></item></channel></rss>