<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cloudwatch — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cloudwatch/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cloudwatch/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS CloudWatch Log Group Deletion for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-cloudwatch-log-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-cloudwatch-log-deletion/</guid><description>Detection of AWS CloudWatch log group deletions via CloudTrail logs, excluding console-based actions, indicating potential defense evasion by attackers attempting to hide their tracks.</description><content:encoded><![CDATA[<p>Attackers may delete CloudWatch log groups to remove evidence of their activities within an AWS environment. This action, identified through <code>DeleteLogGroup</code> events in CloudTrail, allows them to evade detection and forensic analysis. The activity is detected by monitoring CloudTrail logs for successful log group deletions, excluding those initiated from the AWS console. This behavior is significant because it directly undermines the logging and monitoring infrastructure that defenders rely on for incident response and threat hunting. The original Splunk ES-CU analytic was published in 2026-05-05, but the underlying technique is still relevant.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an AWS account.</li>
<li>The attacker enumerates existing CloudWatch log groups using AWS CLI or API calls to identify potential targets for deletion.</li>
<li>The attacker uses compromised credentials or a compromised IAM role to execute the <code>DeleteLogGroup</code> API call via AWS CLI, SDK, or API.</li>
<li>CloudTrail logs the <code>DeleteLogGroup</code> event with <code>eventSource = logs.amazonaws.com</code> and a successful <code>errorCode</code>.</li>
<li>The attacker may repeat this process for multiple log groups to eliminate a broader range of forensic data.</li>
<li>The CloudWatch log group is permanently deleted, removing any logs it contained from the defender&rsquo;s visibility.</li>
<li>The attacker continues their malicious activities, now with reduced risk of detection due to the absence of relevant logs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of CloudWatch log groups allows attackers to operate with significantly reduced visibility. This can lead to delayed incident detection and response, increased dwell time, and greater potential for data exfiltration or system compromise. The deletion of logs hampers forensic investigations, making it difficult to determine the scope and impact of the attack. In environments with strict compliance requirements, such as those governed by HIPAA or PCI DSS, this can lead to significant penalties and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS CloudWatch Log Group Deletion&rdquo; to your SIEM to detect unauthorized log group deletions using <code>eventName = DeleteLogGroup</code> and <code>eventSource = logs.amazonaws.com</code>.</li>
<li>Enable AWS CloudTrail logging to capture <code>DeleteLogGroup</code> events within your AWS environment.</li>
<li>Investigate any detected <code>DeleteLogGroup</code> events, especially those not initiated from the AWS console (<code>userAgent !=console.amazonaws.com</code>), as potential indicators of malicious activity.</li>
<li>Implement strict IAM policies to limit the ability to delete CloudWatch log groups to only authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloudwatch</category><category>defense-evasion</category></item></channel></rss>