<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Attack.t1562.008 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/attack.t1562.008/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/attack.t1562.008/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS Config Service Disabling Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-config-disable/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-config-disable/</guid><description>Detection of AWS Config Service disabling, potentially indicating an attempt to impair defenses by stopping configuration recording and delivery.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting the disabling of AWS Config, a service that continuously monitors and records AWS resource configurations. An attacker might disable AWS Config to evade detection and prevent auditing of their malicious activities within the AWS environment. By deleting delivery channels or stopping the configuration recorder, an attacker can effectively blind the security team to changes made to AWS resources. This activity, if unauthorized, signifies a significant attempt to impair defenses. This brief provides detections based on AWS CloudTrail logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an AWS account, potentially through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker enumerates existing AWS Config resources to identify the delivery channel and configuration recorder.</li>
<li>The attacker executes the <code>DeleteDeliveryChannel</code> API call to stop the delivery of configuration changes to the designated S3 bucket or SNS topic.</li>
<li>The attacker executes the <code>StopConfigurationRecorder</code> API call to halt the recording of configuration changes for AWS resources.</li>
<li>The attacker performs malicious actions within the AWS environment without the activity being recorded by AWS Config.</li>
<li>The attacker may attempt to delete CloudTrail logs, if they have sufficient permissions, to further cover their tracks.</li>
<li>The attacker achieves their objective, such as deploying malicious infrastructure, exfiltrating data, or disrupting services, without immediate detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of AWS Config allows attackers to operate undetected within an AWS environment. This can lead to a delayed response to security incidents, resulting in more significant data breaches, financial losses, or reputational damage. The number of affected AWS accounts and the scope of the damage depend on the attacker&rsquo;s objectives and the duration of the undetected activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS Config Disabling Channel/Recorder&rdquo; to your SIEM and tune for your environment to detect unauthorized disabling of AWS Config resources.</li>
<li>Review AWS IAM policies to ensure that only authorized personnel have the necessary permissions to modify or disable AWS Config settings.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts to reduce the risk of credential compromise.</li>
<li>Monitor CloudTrail logs for any attempts to disable or modify AWS Config resources, referencing the <code>eventSource</code> and <code>eventName</code> fields in the provided Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1562.008</category><category>aws</category></item></channel></rss>