<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Aws-Account — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/aws-account/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/aws-account/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS CloudTrail Logging Stopped for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-cloudtrail-stop-logging/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-cloudtrail-stop-logging/</guid><description>Detection of AWS CloudTrail StopLogging events indicates a potential defense evasion attempt by an attacker to operate stealthily within a compromised AWS environment and hinder incident response.</description><content:encoded><![CDATA[<p>This alert focuses on detecting the <code>StopLogging</code> event within AWS CloudTrail, a critical indicator of potential defense evasion. Attackers often disable CloudTrail logging to conceal their malicious activities, making it difficult for security teams to detect and respond to breaches effectively. The detection specifically looks for successful <code>StopLogging</code> events (<code>errorCode = success</code>) originating from sources other than the AWS console (<code>userAgent!=console.amazonaws.com</code>). By identifying these instances, security teams can quickly investigate the reasons behind the logging stoppage, determine if it was authorized, and take appropriate action to prevent further unauthorized activities. This is especially critical for maintaining visibility and control over AWS environments, ensuring that malicious actions are not conducted without a trace.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an AWS account, potentially through compromised credentials or exploiting a misconfiguration.</li>
<li>The attacker assumes a role or escalates privileges to gain sufficient permissions to manage CloudTrail.</li>
<li>The attacker identifies the active CloudTrail trails within the AWS environment.</li>
<li>The attacker executes the <code>StopLogging</code> API call against the identified CloudTrail trail.</li>
<li>CloudTrail logs the <code>StopLogging</code> event, recording the action, user, and source IP.</li>
<li>The attacker proceeds with malicious activities, such as data exfiltration, resource manipulation, or deploying backdoors, without being logged by CloudTrail.</li>
<li>The attacker attempts to remove or modify existing security controls and monitoring configurations.</li>
<li>The attacker persists in the environment, potentially creating new identities or backdoors to maintain access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of CloudTrail logging can have severe consequences. It impairs incident response by removing the primary source of audit data. Without CloudTrail logs, security teams lose visibility into attacker activities, making it difficult to determine the scope and impact of the breach. Attackers can operate undetected, exfiltrate sensitive data, modify critical resources, and establish persistent backdoors. The impact can range from data breaches and financial losses to reputational damage and regulatory fines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect instances of <code>StopLogging</code> events in AWS CloudTrail logs and tune for your environment.</li>
<li>Investigate any detected <code>StopLogging</code> events, focusing on the user (<code>user</code>), source IP (<code>src</code>), and reason for stopping logging.</li>
<li>Enable multi-factor authentication (MFA) for all AWS accounts to prevent credential compromise (TTP: TA0001).</li>
<li>Enforce the principle of least privilege to minimize the impact of compromised credentials (TTP: TA0004).</li>
<li>Regularly review and audit CloudTrail configurations to ensure logging is enabled and properly configured (TTP: TA0005).</li>
<li>Implement alerting for changes to CloudTrail configuration to detect unauthorized modifications (TTP: TA0005).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>defense-evasion</category><category>aws-account</category></item></channel></rss>