<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Deletion — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/deletion/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 19 Dec 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/deletion/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS SAML Provider Deletion Activity</title><link>https://feed.craftedsignal.io/briefs/2024-12-19-aws-saml-provider-deletion/</link><pubDate>Thu, 19 Dec 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-19-aws-saml-provider-deletion/</guid><description>An adversary may delete an AWS SAML provider to disrupt administrative access, hindering incident response and potentially escalating privileges within the AWS environment.</description><content:encoded><![CDATA[<p>The deletion of a SAML provider in AWS can be a significant indicator of malicious activity. An attacker who has gained initial access to an AWS environment may attempt to remove the SAML provider used by the information security team or system administrators. This action can severely impede the team&rsquo;s ability to investigate and respond to ongoing attacks. By disrupting access, the attacker gains a window of opportunity to further escalate privileges, move laterally within the environment, and achieve their objectives without immediate detection or intervention. This activity directly impacts the availability and integrity of resources within the AWS cloud environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained to an AWS account through compromised credentials or other means (T1078.004).</li>
<li>The attacker enumerates existing IAM resources, including SAML providers, using AWS CLI or API calls.</li>
<li>The attacker identifies the SAML provider used by administrative or security teams.</li>
<li>The attacker executes the <code>DeleteSAMLProvider</code> API call via the AWS CLI, API, or AWS Management Console (T1531).</li>
<li>The <code>DeleteSAMLProvider</code> event is logged in AWS CloudTrail with a &ldquo;success&rdquo; status.</li>
<li>Administrative and security teams lose access to AWS resources that require SAML authentication.</li>
<li>The attacker leverages the compromised account to escalate privileges, create new IAM users, or modify existing policies.</li>
<li>The attacker persists in the environment, potentially exfiltrating data or deploying malicious workloads (T1485).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deletion of an AWS SAML provider can have serious consequences. It disrupts access for administrators and security personnel, delaying incident response and potentially allowing attackers to further compromise the environment. This can lead to data breaches, service disruptions, and financial losses. The severity of the impact depends on the criticality of the affected AWS resources and the speed of detection and recovery.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS SAML Provider Deletion Activity&rdquo; to your SIEM and tune for your environment to detect this specific event.</li>
<li>Investigate any <code>DeleteSAMLProvider</code> events in AWS CloudTrail, focusing on the user identity, user agent, and source IP address (logsource: aws/cloudtrail).</li>
<li>Implement multi-factor authentication (MFA) for all IAM users, especially those with administrative privileges, to reduce the risk of credential compromise (T1110).</li>
<li>Review and enforce the principle of least privilege for all IAM roles and users to limit the impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>saml</category><category>iam</category><category>deletion</category><category>impact</category></item><item><title>Detection of Azure Application Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-app-deletion/</link><pubDate>Wed, 03 Jan 2024 15:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-app-deletion/</guid><description>This alert identifies when an application is deleted within an Azure environment, which could indicate malicious activity or unintended misconfiguration leading to service disruption.</description><content:encoded><![CDATA[<p>This detection focuses on identifying instances where an application is deleted within an Azure environment. While legitimate application deletions occur as part of IT administration, malicious actors might delete applications to disrupt services, remove evidence of their presence, or prepare for a larger attack by removing security controls or access points. This activity is logged within Azure Activity Logs and includes events such as &ldquo;Delete application&rdquo; and &ldquo;Hard Delete application&rdquo;. Monitoring these events can provide early warning of potential security incidents or compliance violations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to an Azure account, potentially through compromised credentials or exploiting a vulnerability in an application.</li>
<li><strong>Privilege Escalation (Optional):</strong> The attacker escalates their privileges within the Azure environment to gain sufficient permissions to manage and delete applications.</li>
<li><strong>Reconnaissance:</strong> The attacker identifies target applications for deletion, potentially those critical for business operations or those used for security controls.</li>
<li><strong>Disable Monitoring (Optional):</strong> The attacker attempts to disable logging or monitoring related to application management to avoid detection.</li>
<li><strong>Application Deletion:</strong> The attacker initiates the deletion of the targeted application using the Azure portal, Azure CLI, or PowerShell.</li>
<li><strong>Confirmation/Hard Delete:</strong> Depending on the application&rsquo;s configuration and Azure policies, the attacker may need to confirm the deletion or perform a &ldquo;hard delete&rdquo; to permanently remove the application.</li>
<li><strong>Cover Tracks:</strong> The attacker attempts to remove any remaining logs or traces of their activity to hinder forensic investigation.</li>
<li><strong>Impact:</strong> Service disruption or data loss due to the deleted application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deletion of an Azure application can lead to significant service disruption, data loss, and potential financial damages. The impact depends on the criticality of the deleted application and the organization&rsquo;s disaster recovery capabilities. Successful deletion can interrupt business processes, impacting both internal users and external customers. It may also lead to reputational damage and compliance violations if the application handled sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect application deletion events in Azure Activity Logs.</li>
<li>Review user roles and permissions in Azure Active Directory (Entra ID) and enforce the principle of least privilege.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with administrative privileges.</li>
<li>Enable auditing and logging for all Azure resources, including application management activities.</li>
<li>Investigate any detected application deletion events promptly to determine the root cause and potential impact.</li>
<li>Establish a process for reviewing and approving application deletion requests to prevent accidental or malicious deletions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>application</category><category>deletion</category><category>impact</category><category>t1489</category></item></channel></rss>