<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Bedrock — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/bedrock/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/bedrock/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS Bedrock Model Invocation Logging Deletion Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-bedrock-logging-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-bedrock-logging-deletion/</guid><description>Detection of attempts to delete AWS Bedrock model invocation logging configurations, potentially indicating an adversary trying to remove audit trails of model interactions after credential compromise, to hide malicious AI model usage.</description><content:encoded><![CDATA[<p>This analytic identifies attempts to delete AWS Bedrock model invocation logging configurations. The activity is detected by monitoring AWS CloudTrail logs for calls to the DeleteModelInvocationLogging API. Successful deletion of these logs could allow attackers to interact with AI models hosted on AWS Bedrock without leaving forensic traces. This may be indicative of an adversary who has compromised AWS credentials and is attempting to evade detection of their malicious actions. The impact could range from data exfiltration and prompt injection attacks to other unauthorized activities, all performed without generating audit records. This event should be considered a high-priority alert, as it directly impacts the ability to monitor and respond to potentially malicious use of AI models within the AWS environment. The detection leverages AWS CloudTrail logs and is based on the Splunk ES-CU analytic &ldquo;AWS Bedrock Delete Model Invocation Logging Configuration&rdquo;.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an AWS account, potentially through credential compromise or other means.</li>
<li>The attacker enumerates the existing AWS Bedrock model invocation logging configurations within the targeted AWS account.</li>
<li>The attacker executes the <code>DeleteModelInvocationLoggingConfiguration</code> API call to disable or remove the logging configuration.</li>
<li>AWS CloudTrail logs the <code>DeleteModelInvocationLoggingConfiguration</code> event, capturing details such as the user, source IP, and timestamp.</li>
<li>The attacker proceeds to interact with AWS Bedrock models, potentially performing data exfiltration or prompt injection attacks.</li>
<li>Because model invocation logging has been disabled, these interactions are not logged, hindering detection and incident response efforts.</li>
<li>The attacker attempts to further cover their tracks by deleting or modifying other relevant CloudTrail logs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to unauthorized access and manipulation of AI models hosted on AWS Bedrock. The deletion of model invocation logs allows attackers to hide their activities, making it difficult to detect and respond to incidents such as data exfiltration or prompt injection attacks. This can result in significant financial loss, reputational damage, and legal liabilities. The exact number of victims and the extent of the damage depend on the scope and duration of the attacker&rsquo;s access to the AI models.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect AWS Bedrock Logging Deletion</code> to your SIEM to detect attempts to delete AWS Bedrock model invocation logging configurations.</li>
<li>Investigate any detected instances of <code>DeleteModelInvocationLoggingConfiguration</code> events, focusing on unexpected users or source IPs, to validate legitimate administrative actions.</li>
<li>Enable AWS CloudTrail logging for all AWS regions and services, including Bedrock, to ensure comprehensive audit coverage.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts to reduce the risk of credential compromise (T1685.002).</li>
<li>Monitor CloudTrail logs for unusual API calls and access patterns to identify potential insider threats or compromised accounts.</li>
<li>Review and update IAM policies to enforce the principle of least privilege and restrict access to sensitive API actions, such as <code>DeleteModelInvocationLoggingConfiguration</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>bedrock</category><category>cloudtrail</category><category>logging</category><category>defense-evasion</category></item><item><title>AWS Bedrock GuardRails Deletion Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-bedrock-guardrails-deletion/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-bedrock-guardrails-deletion/</guid><description>Detection of AWS Bedrock GuardRails deletion, which are security controls to prevent harmful AI outputs, could indicate an adversary attempting to remove safety measures after credential compromise to enable malicious model outputs.</description><content:encoded><![CDATA[<p>This analytic focuses on detecting the deletion of AWS Bedrock GuardRails. AWS Bedrock is a fully managed service that offers a choice of high-performing foundation models (FMs) from leading AI companies. GuardRails within Bedrock are security controls designed to prevent harmful, biased, or inappropriate AI outputs. The deletion of these guardrails, detected through AWS CloudTrail logs, could indicate a malicious actor attempting to bypass security measures after compromising credentials. This could potentially enable harmful or malicious model outputs, leading to the generation of offensive content, extraction of sensitive information, or circumvention of prompt injection defenses. This activity matters to defenders as it highlights a potential attempt to manipulate AI model behavior for malicious purposes, requiring immediate investigation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an AWS account with sufficient privileges to manage Bedrock resources, possibly through credential compromise.</li>
<li>The attacker authenticates to the AWS environment, establishing a session.</li>
<li>The attacker identifies existing AWS Bedrock GuardRails configurations using AWS APIs or the AWS Management Console.</li>
<li>The attacker uses the <code>DeleteGuardrail</code> API call via the AWS CLI, SDK, or Management Console, specifying the <code>guardrailIdentifier</code> of the targeted GuardRail.</li>
<li>AWS CloudTrail logs the <code>DeleteGuardrail</code> event, including details such as the user identity, source IP address, and GuardRail identifier.</li>
<li>The GuardRail is successfully deleted, removing the configured safety controls for the Bedrock models.</li>
<li>The attacker leverages the now-unprotected Bedrock models to generate harmful content, extract sensitive information, or bypass other security controls.</li>
<li>The attacker exfiltrates sensitive data generated from the unprotected model to an external location.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of Bedrock GuardRails could allow attackers to manipulate AI models for malicious purposes. This could lead to the generation of offensive or harmful content, extraction of sensitive information, or bypassing prompt injection defenses. Organizations utilizing AWS Bedrock may experience reputational damage, data breaches, and regulatory compliance issues. While specific victim numbers are unavailable, the impact could be significant depending on the sensitivity of the data processed by the models.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable AWS CloudTrail logging for all AWS regions, specifically capturing Bedrock service events to ensure the <code>DeleteGuardrail</code> API calls are logged (data_source).</li>
<li>Deploy the provided Sigma rule <code>Detect AWS Bedrock GuardRails Deletion</code> to your SIEM and tune for your environment to detect unauthorized GuardRail deletions.</li>
<li>Investigate any detected <code>DeleteGuardrail</code> events to determine the legitimacy of the action and identify potential credential compromise or malicious intent (Sigma rule).</li>
<li>Implement an allowlist for expected administrators who regularly manage GuardRails configurations to reduce false positives (known_false_positives).</li>
<li>Monitor the <code>src</code> IP addresses from which <code>DeleteGuardrail</code> API calls are made to identify potentially suspicious or unauthorized access points (rule and RBA).</li>
<li>Enforce multi-factor authentication (MFA) for all AWS accounts, especially those with privileges to manage Bedrock resources, to mitigate credential compromise (overview).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>bedrock</category><category>cloudtrail</category><category>defense-evasion</category></item></channel></rss>