<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Iam — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/iam/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 23:13:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/iam/feed.xml" rel="self" type="application/rss+xml"/><item><title>Expanding Detection Beyond Endpoints to Counter Evolving Threats</title><link>https://feed.craftedsignal.io/briefs/2026-06-detection-beyond-endpoint/</link><pubDate>Fri, 01 May 2026 23:13:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-detection-beyond-endpoint/</guid><description>Threat actors are rapidly exfiltrating data by exploiting blind spots created by an over-reliance on endpoint data, necessitating a comprehensive security approach that incorporates cloud, identity, and network telemetry for effective threat detection and response.</description><content:encoded><![CDATA[<p>The 2026 Unit 42 Global Incident Response Report highlights that threat actors are moving 4x faster to exfiltration than in 2025, exploiting blind spots due to an over-reliance on endpoint data. The proliferation of cloud services, microservices, and remote users has expanded the attack surface beyond what any single tool can monitor. Unit 42 found that in 75% of incidents, critical evidence was present in logs but wasn&rsquo;t accessible or operationalized, allowing attackers to exploit the gaps. Organizations need to evolve their SOCs to ingest and correlate telemetry across their entire IT landscape, including IAM, cloud assets, OT/IoT, and AI workloads. Unit 42 recommends a single-pane-of-glass strategy powered by an AI-driven SOC platform like Cortex XSIAM to combat these threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access via Cloud Misconfiguration:</strong> The attacker gains initial access through a misconfigured cloud service access key.</li>
<li><strong>Cloud Console Manipulation:</strong> The attacker manipulates the cloud console to hide their tracks from endpoint detection.</li>
<li><strong>Pivot to Cloud-Hosted Server:</strong> From the cloud console, the attacker pivots to a cloud-hosted server to begin discovery.</li>
<li><strong>Credential Theft (Covert C2):</strong> The attacker utilizes DNS tunneling to a cloud storage location for C2 communication and steals credentials to use legitimate applications.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally using the stolen credentials, triggering impossible travel alerts across SaaS apps.</li>
<li><strong>Rogue Asset Introduction:</strong> The attacker introduces a rogue device into the network, bypassing traditional endpoint security measures.</li>
<li><strong>Persistence:</strong> The attacker maintains persistence through the rogue device, using it for covert movement and access.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrates sensitive data, taking advantage of the gaps in security visibility.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Organizations are increasingly vulnerable to rapid data exfiltration due to the expanded attack surface and reliance on endpoint-centric security. The inability to correlate telemetry across diverse IT zones allows attackers to operate undetected, leading to significant data breaches, financial losses, and reputational damage. Unit 42&rsquo;s research shows that attackers are moving 4x faster to exfiltration, exacerbating the impact of successful intrusions. The attacks target cloud environments, identity systems, and networks, creating a complex threat landscape for security teams to navigate.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ingest and correlate telemetry from all IT zones (IAM, cloud, OT/IoT, AI workloads) into a single repository, as described in the overview, to eliminate data silos and gain holistic visibility.</li>
<li>Implement User and Entity Behavior Analytics (UEBA) as mentioned in the overview, to detect anomalous behavior indicative of compromised credentials by using a centralized workbench.</li>
<li>Deploy Cortex XSIAM, as discussed in the overview, to leverage AI-driven alert stitching, ML-based incident scoring, and UEBA for automated detection, investigation, and response.</li>
<li>Implement continuous network monitoring and external attack surface management to detect and manage rogue assets, as highlighted in the attack chain.</li>
<li>Evaluate your current visibility through a formal assessment as recommended in the conclusion, to identify gaps in security coverage.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud-security</category><category>iam</category><category>incident-response</category><category>threat-detection</category></item><item><title>AWS IAM Privilege Operations via Lambda Execution Role</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-aws-lambda-iam-privilege-escalation/</link><pubDate>Fri, 01 May 2026 20:57:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-aws-lambda-iam-privilege-escalation/</guid><description>Detection of IAM API calls that create or empower IAM users and roles, attach policies, or configure instance profiles when the caller is an assumed role session associated with AWS Lambda, potentially indicating privilege escalation or persistence.</description><content:encoded><![CDATA[<p>This threat focuses on the abuse of AWS Lambda execution roles to perform sensitive IAM operations. Lambda functions, often running with over-permissioned roles, can be exploited by adversaries to escalate privileges and establish persistence within an AWS environment. An attacker gaining control of a Lambda function can leverage its execution role to make IAM API calls that would normally require elevated permissions. This includes creating new IAM users or roles, attaching policies to existing IAM entities, and modifying EC2 instance profiles. The scope of this threat includes any AWS environment utilizing Lambda functions with IAM permissions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a Lambda function, either through code injection, vulnerable dependencies, or misconfiguration.</li>
<li>The attacker leverages the Lambda function&rsquo;s execution role, which has excessive IAM permissions.</li>
<li>The attacker executes IAM API calls, such as <code>CreateUser</code>, <code>CreateRole</code>, or <code>CreateAccessKey</code>, to create new IAM identities.</li>
<li>The attacker uses <code>AttachUserPolicy</code>, <code>PutUserPolicy</code>, <code>AttachRolePolicy</code>, or <code>PutRolePolicy</code> to grant elevated permissions to the newly created or existing IAM identities.</li>
<li>The attacker modifies instance profiles using <code>CreateInstanceProfile</code> and <code>AddRoleToInstanceProfile</code> to prepare EC2 instances for lateral movement.</li>
<li>The attacker uses the newly created or modified IAM identities to assume roles and access resources they were not previously authorized to access via <code>sts:AssumeRole</code>.</li>
<li>The attacker achieves privilege escalation, gaining control over sensitive AWS resources and services.</li>
<li>The attacker establishes persistence by creating rogue IAM users, roles, or access keys.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to full compromise of the AWS environment. An attacker could create highly privileged IAM users and roles, granting them the ability to access and control all AWS resources. This can result in data breaches, service disruptions, and financial losses. The impact is magnified in environments where Lambda functions are heavily relied upon for critical business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS IAM Sensitive Operations via Lambda Execution Role&rdquo; to your SIEM and tune for your environment to detect the described IAM API calls originating from Lambda execution roles.</li>
<li>Review and restrict the permissions granted to Lambda execution roles, following the principle of least privilege, to minimize the potential impact of a compromised function.</li>
<li>Monitor <code>aws.cloudtrail.user_identity.arn</code> to identify the Lambda function and associated deployment path responsible for the IAM API calls.</li>
<li>Investigate <code>aws.cloudtrail.request_parameters</code> for targets such as <code>userName</code>, <code>groupName</code>, <code>roleName</code>, <code>policyArn</code>, or <code>instanceProfileName</code> to understand the scope of the IAM operations.</li>
<li>Revoke or rotate the credentials of any compromised Lambda execution roles to prevent further unauthorized access.</li>
<li>Remediate any rogue IAM users, roles, or access keys created by the attacker to eliminate persistence mechanisms.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>iam</category><category>lambda</category><category>privilege-escalation</category><category>persistence</category></item><item><title>AWS IAM Login Profile Added for Root</title><link>https://feed.craftedsignal.io/briefs/2024-12-aws-root-login-profile/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-aws-root-login-profile/</guid><description>An adversary with temporary root access in AWS may create a login profile for the root account to establish persistent console access, even if the original access keys are rotated or disabled.</description><content:encoded><![CDATA[<p>This rule detects the creation of a console login profile for the AWS account root user, a highly privileged account. While <code>CreateLoginProfile</code> is normally applied to IAM users, when executed from a temporary root session (e.g., via <code>AssumeRoot</code>) without specifying a <code>userName</code>, the profile is created for the root principal. This activity is especially concerning because it provides persistent access. An attacker gaining temporary root access via STS or credential compromise might exploit this to set a root password. The attacker can then use this new password to log in through the console. This method circumvents traditional access key rotation or disabling and can be employed even after the initial vulnerability is patched. This activity started being tracked on 2024-12-02, defenders need to be aware of this persistence mechanism and promptly investigate any such incidents.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account with sufficient privileges, possibly through compromised credentials or an STS session.</li>
<li>The attacker executes the <code>AssumeRoot</code> API call to assume the privileges of the root user.</li>
<li>The attacker uses the <code>CreateLoginProfile</code> API call without specifying a <code>userName</code>. This action creates a console login profile directly for the root account instead of an IAM user. The <code>aws.cloudtrail.request_parameters</code> will not contain <code>userName=</code>.</li>
<li>The attacker sets a password for the root account using the <code>CreateLoginProfile</code> API. <code>passwordResetRequired</code> might be set to <code>true</code> or omitted, with omission potentially indicating an attacker-controlled password.</li>
<li>The attacker uses the newly created root account password to log in to the AWS Management Console. The event will be logged as a <code>ConsoleLogin</code> event.</li>
<li>The attacker uses the root account&rsquo;s privileges to create or modify resources, escalate privileges, or exfiltrate data.</li>
<li>The attacker maintains persistence by using the console login, even if the initially compromised credentials or temporary session tokens are revoked.</li>
<li>The attacker may also create new IAM users or roles with elevated permissions to further solidify their presence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to complete control over the AWS environment. The attacker can create, modify, or delete resources; access sensitive data; and disrupt services. Because the root user has unrestricted privileges, the impact is extremely high. There have been no reported victim counts. However, any successful exploitation can have severe impacts including data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS IAM Login Profile Added for Root&rdquo; to detect unauthorized creation of login profiles for the root account and tune for your environment.</li>
<li>Investigate any <code>CreateLoginProfile</code> events where <code>aws.cloudtrail.user_identity.type</code> is <code>Root</code> and <code>aws.cloudtrail.request_parameters</code> does not contain <code>userName=</code>.</li>
<li>Enable CloudTrail, GuardDuty, AWS Config, and Security Hub across all regions for continuous monitoring of root and IAM activity to improve overall visibility.</li>
<li>Review IAM policies for least-privilege adherence, focusing on <code>iam:CreateLoginProfile</code>, <code>iam:UpdateLoginProfile</code>, and <code>iam:CreateAccessKey</code> permissions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>iam</category><category>persistence</category></item><item><title>AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts</title><link>https://feed.craftedsignal.io/briefs/2026-06-aws-iam-access-key-correlation/</link><pubDate>Mon, 06 Apr 2026 14:37:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-aws-iam-access-key-correlation/</guid><description>This rule correlates AWS Long-Term Access Key First Seen from Source IP alerts with other open alerts of medium or higher severity that share the same IAM access key ID to prioritize investigation of potentially compromised accounts, helping identify post-compromise activity.</description><content:encoded><![CDATA[<p>This detection rule, published by Elastic, is designed to correlate AWS security alerts and prioritize investigations related to potentially compromised IAM access keys. Specifically, it focuses on scenarios where a long-term IAM access key is observed originating from a new source IP address (detected by the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; rule, rule ID 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f) and is also associated with other open alerts of medium, high, or critical severity. This correlation aims to surface instances where a newly exposed or compromised access key is actively being used for malicious activities, enabling security teams to respond more effectively to potential credential access incidents and initial access attempts. The rule is a higher-order rule that analyzes existing security alerts within an Elastic Security deployment and leverages the <code>kibana.alert</code> fields to identify related events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a valid AWS IAM Long-Term Access Key. This could be through phishing, credential stuffing, or exposed credentials in source code.</li>
<li>The attacker uses the compromised access key to interact with AWS services from a new and previously unseen IP address. This triggers the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; rule (rule ID: 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f).</li>
<li>The attacker leverages the compromised credentials to perform reconnaissance activities within the AWS environment, such as listing resources or querying IAM configurations.</li>
<li>The attacker attempts to escalate privileges by exploiting misconfigurations or vulnerabilities in IAM policies.</li>
<li>The attacker performs actions indicating lateral movement within the AWS environment, such as accessing or modifying resources in different AWS accounts.</li>
<li>The attacker compromises additional AWS resources or services, such as EC2 instances or S3 buckets. These activities trigger medium, high, or critical severity alerts.</li>
<li>The correlation rule identifies the co-occurrence of the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; alert and other elevated severity alerts associated with the same access key ID.</li>
<li>The security team investigates the correlated alerts and takes appropriate remediation steps, such as rotating the compromised access key and reviewing IAM policies.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging compromised AWS IAM credentials can lead to significant data breaches, service disruption, and financial losses. Attackers can gain unauthorized access to sensitive data stored in S3 buckets, compromise EC2 instances, and disrupt critical AWS services. The correlation rule aims to reduce the dwell time of attackers by prioritizing the investigation of compromised credentials associated with ongoing malicious activity. This can prevent attackers from further escalating their attacks and minimizing the overall impact of the breach. Failure to detect and respond to these attacks can result in regulatory fines, reputational damage, and loss of customer trust.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts&rdquo; rule (rule ID 98cfaa44-83f0-4aba-90c4-363fb9d51a75) in your Elastic Security environment to identify potentially compromised IAM access keys.</li>
<li>Investigate alerts triggered by the rule by pivoting on the <code>aws.cloudtrail.user_identity.access_key_id</code> in CloudTrail and IAM to understand the context of the access key usage.</li>
<li>Review the sibling alerts identified by the rule using <code>Esql.kibana_alert_rule_name_values</code> and <code>Esql.kibana_alert_rule_id_values</code> to understand the scope and impact of the potential compromise.</li>
<li>Configure your Elastic Security deployment to properly map risk scores to severity levels, ensuring that <code>kibana.alert.risk_score &gt;= 47</code> corresponds to medium or higher severity alerts.</li>
<li>Rotate or disable any IAM access keys identified as compromised by the rule to prevent further unauthorized access.</li>
<li>Enable AWS CloudTrail logging to capture detailed information about API calls made within your AWS environment, providing valuable context for investigating security alerts.</li>
<li>Implement the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; rule (rule_id: 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f) if not already enabled, as it is a pre-requisite for this correlation rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>iam</category><category>credential-access</category><category>initial-access</category></item><item><title>AWS SAML Provider Deletion Activity</title><link>https://feed.craftedsignal.io/briefs/2024-12-19-aws-saml-provider-deletion/</link><pubDate>Thu, 19 Dec 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-19-aws-saml-provider-deletion/</guid><description>An adversary may delete an AWS SAML provider to disrupt administrative access, hindering incident response and potentially escalating privileges within the AWS environment.</description><content:encoded><![CDATA[<p>The deletion of a SAML provider in AWS can be a significant indicator of malicious activity. An attacker who has gained initial access to an AWS environment may attempt to remove the SAML provider used by the information security team or system administrators. This action can severely impede the team&rsquo;s ability to investigate and respond to ongoing attacks. By disrupting access, the attacker gains a window of opportunity to further escalate privileges, move laterally within the environment, and achieve their objectives without immediate detection or intervention. This activity directly impacts the availability and integrity of resources within the AWS cloud environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained to an AWS account through compromised credentials or other means (T1078.004).</li>
<li>The attacker enumerates existing IAM resources, including SAML providers, using AWS CLI or API calls.</li>
<li>The attacker identifies the SAML provider used by administrative or security teams.</li>
<li>The attacker executes the <code>DeleteSAMLProvider</code> API call via the AWS CLI, API, or AWS Management Console (T1531).</li>
<li>The <code>DeleteSAMLProvider</code> event is logged in AWS CloudTrail with a &ldquo;success&rdquo; status.</li>
<li>Administrative and security teams lose access to AWS resources that require SAML authentication.</li>
<li>The attacker leverages the compromised account to escalate privileges, create new IAM users, or modify existing policies.</li>
<li>The attacker persists in the environment, potentially exfiltrating data or deploying malicious workloads (T1485).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deletion of an AWS SAML provider can have serious consequences. It disrupts access for administrators and security personnel, delaying incident response and potentially allowing attackers to further compromise the environment. This can lead to data breaches, service disruptions, and financial losses. The severity of the impact depends on the criticality of the affected AWS resources and the speed of detection and recovery.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS SAML Provider Deletion Activity&rdquo; to your SIEM and tune for your environment to detect this specific event.</li>
<li>Investigate any <code>DeleteSAMLProvider</code> events in AWS CloudTrail, focusing on the user identity, user agent, and source IP address (logsource: aws/cloudtrail).</li>
<li>Implement multi-factor authentication (MFA) for all IAM users, especially those with administrative privileges, to reduce the risk of credential compromise (T1110).</li>
<li>Review and enforce the principle of least privilege for all IAM roles and users to limit the impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>saml</category><category>iam</category><category>deletion</category><category>impact</category></item><item><title>S3Browser IAM Policy Creation with Default Bucket Name</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-s3browser-iam-policy/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-s3browser-iam-policy/</guid><description>An AWS IAM policy is created by the S3Browser utility with the default S3 bucket name placeholder, potentially indicating unauthorized access or misconfiguration.</description><content:encoded><![CDATA[<p>The S3Browser utility is being used to create Inline IAM policies within AWS. This activity is flagged as suspicious when the policy includes the default S3 bucket name placeholder value of <code>&lt;YOUR-BUCKET-NAME&gt;</code>. This could indicate that the user has not properly configured the policy or is unaware of the implications of using a generic placeholder, potentially granting unintended access to S3 resources. This behavior was observed being used by the threat actor Guivil. The use of S3Browser in this manner poses a risk of privilege escalation, persistence, and unauthorized access to sensitive data stored in S3 buckets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, possibly through compromised credentials or misconfigured IAM roles (T1078.004).</li>
<li>The attacker utilizes the S3Browser utility to interact with AWS S3 buckets.</li>
<li>The attacker attempts to create an Inline IAM policy using S3Browser.</li>
<li>The attacker fails to replace the default bucket name placeholder <code>&lt;YOUR-BUCKET-NAME&gt;</code> with a specific bucket ARN.</li>
<li>The attacker saves the IAM policy with the default bucket name placeholder, leading to a broad or unintended scope of permissions.</li>
<li>The poorly configured policy is applied to a user, role, or group.</li>
<li>The attacker potentially escalates privileges or gains unauthorized access to S3 resources.</li>
<li>The attacker persists in the environment with the newly created or modified IAM policy.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Creation of an IAM policy with the default bucket name placeholder leaves S3 buckets open to potential unauthorized access. A successful attack could lead to data exfiltration, data modification, or denial of service. The scope of the impact depends on the specific permissions granted within the policy and the resources accessible through the affected IAM user, role, or group.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS IAM S3Browser Templated S3 Bucket Policy Creation&rdquo; to your SIEM and tune for your environment to detect this specific activity.</li>
<li>Investigate any instances where <code>PutUserPolicy</code> events are associated with the S3Browser user agent (logsource: aws/cloudtrail).</li>
<li>Review existing IAM policies for the presence of the default bucket name placeholder <code>arn:aws:s3:::&lt;YOUR-BUCKET-NAME&gt;/*</code> (logsource: aws/cloudtrail).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>iam</category><category>s3browser</category><category>s3</category><category>policy</category><category>cloudtrail</category></item><item><title>AWS IAM User or Access Key Creation via S3 Browser</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-s3browser-iam/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-s3browser-iam/</guid><description>The use of S3 Browser to create IAM users or access keys in AWS environments indicates a potential privilege escalation, persistence, or initial access attempt by threat actors leveraging a known cloud administration tool.</description><content:encoded><![CDATA[<p>The S3 Browser utility, a Windows-based client for managing Amazon S3 storage and other cloud services, can be abused by threat actors to create new IAM users or access keys within compromised AWS environments. This activity, if unauthorized, can lead to privilege escalation, persistence, or even initial access, depending on the context of the compromise. The use of S3 Browser is identifiable via the userAgent string in AWS CloudTrail logs. While legitimate use of S3 Browser for administrative tasks exists, its unexpected appearance in user activity, particularly in sensitive accounts, should be investigated. This activity is particularly concerning because it can allow attackers to establish a foothold in the cloud environment and move laterally.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS environment, potentially through compromised credentials or an exploited vulnerability.</li>
<li>The attacker installs and configures S3 Browser on a compromised host or uses an existing installation.</li>
<li>The attacker authenticates S3 Browser to the AWS environment using existing compromised credentials or an assumed role.</li>
<li>The attacker uses S3 Browser to execute the <code>CreateUser</code> API call within AWS IAM.</li>
<li>The attacker configures the new IAM user with elevated privileges, potentially granting administrator access.</li>
<li>Alternatively, the attacker uses S3 Browser to execute the <code>CreateAccessKey</code> API call for an existing IAM user.</li>
<li>The attacker uses the newly created access key to perform actions within the AWS environment.</li>
<li>The attacker leverages the new user or access key for persistence, lateral movement, and data exfiltration within the AWS environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and IAM creation can lead to complete compromise of the AWS environment. An attacker with escalated privileges can access sensitive data, modify configurations, disrupt services, and deploy malicious infrastructure. Depending on the permissions granted to the created user or access key, the attacker could potentially pivot to other AWS accounts or services, leading to widespread damage. This can result in significant financial losses, reputational damage, and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS IAM S3Browser User or AccessKey Creation&rdquo; to your SIEM and tune for your environment to detect anomalous IAM activity originating from S3 Browser.</li>
<li>Investigate any instances of <code>CreateUser</code> or <code>CreateAccessKey</code> events in AWS CloudTrail logs where the <code>userAgent</code> contains &ldquo;S3 Browser&rdquo;.</li>
<li>Implement multi-factor authentication (MFA) for all IAM users to mitigate the risk of credential compromise.</li>
<li>Review and enforce the principle of least privilege for all IAM users and roles to limit the impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>iam</category><category>privilege-escalation</category><category>persistence</category></item><item><title>AWS IAM Customer Managed Policy Version Manipulation for Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-iam-policy-manipulation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-iam-policy-manipulation/</guid><description>Successful creation of new or setting default versions of customer-managed IAM policies can indicate privilege escalation attempts by attackers modifying policy permissions.</description><content:encoded><![CDATA[<p>This detection identifies potentially malicious activity related to AWS Identity and Access Management (IAM) policies. Specifically, it focuses on the creation of new versions of customer-managed policies (<code>CreatePolicyVersion</code>) and the modification of the default version (<code>SetDefaultPolicyVersion</code>). Attackers who have compromised IAM users or roles with sufficient permissions (iam:CreatePolicyVersion or iam:SetDefaultPolicyVersion) can use these actions to escalate their privileges within the AWS environment. By introducing a more permissive policy version and setting it as the default, attackers can gain unauthorized access to resources and perform actions that would otherwise be restricted. This activity is especially concerning when the modified policies are attached to highly privileged roles or users, such as those used for administrative tasks or break-glass scenarios.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises an IAM user or role with permissions to modify IAM policies (<code>iam:CreatePolicyVersion</code> or <code>iam:SetDefaultPolicyVersion</code>).</li>
<li>The attacker identifies a customer-managed policy attached to a high-privilege role or user.</li>
<li>The attacker crafts a new policy version with overly permissive rules, such as wildcard actions and resources.</li>
<li>The attacker uses the <code>CreatePolicyVersion</code> API call to upload the malicious policy version to the target policy.</li>
<li>Alternatively, the attacker uses the <code>SetDefaultPolicyVersion</code> API call to set a pre-existing, but less restrictive, policy version as the default.</li>
<li>The compromised IAM user or role assumes the high-privilege role targeted in step 2.</li>
<li>The attacker gains elevated privileges based on the modified IAM policy.</li>
<li>The attacker performs unauthorized actions within the AWS environment, such as accessing sensitive data, modifying infrastructure, or creating new resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to significant privilege escalation, allowing attackers to gain control over critical AWS resources and data. The number of affected users and roles depends on the scope of the compromised policy and its attachments. The consequences can include data breaches, service disruptions, and financial losses. In environments where IAM policies are not closely monitored, attackers may be able to maintain their elevated access for extended periods, further compounding the damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS IAM Customer Managed Policy Version Created or Default Version Set&rdquo; to your SIEM to detect suspicious policy modifications. Tune the rule based on your organization&rsquo;s baseline activity.</li>
<li>Review <code>aws.cloudtrail.request_parameters</code> logs to identify the <code>policyArn</code> and <code>policyDocument</code> associated with the policy changes detected by the rule.</li>
<li>Implement strong IAM governance practices, including the principle of least privilege and regular reviews of policy permissions, to minimize the impact of policy manipulation.</li>
<li>Monitor CloudTrail logs for <code>AttachUserPolicy</code>, <code>AttachRolePolicy</code>, or <code>CreatePolicyVersion</code> spikes from the same principal as detected policy modifications.</li>
<li>Enable MFA for all IAM users, especially those with permissions to manage IAM policies.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>aws</category><category>iam</category></item><item><title>AWS AssumeRoleWithWebIdentity from Kubernetes SA and External ASN</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-assume-role-external-asn/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-assume-role-external-asn/</guid><description>Detects successful AWS `AssumeRoleWithWebIdentity` calls where the caller identity is a Kubernetes service account and the source autonomous system organization is not `Amazon.com, Inc.`, which may indicate a stolen or misused projected service-account token being exchanged for IAM credentials off-cluster.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of successful AWS <code>AssumeRoleWithWebIdentity</code> calls originating from a Kubernetes service account but not from an Amazon-managed Autonomous System Number (ASN). The primary concern is the potential compromise or misuse of projected service account tokens. Kubernetes service accounts can be mapped to IAM roles through OIDC using IRSA (IAM Roles for Service Accounts). Typically, these credential requests originate from within AWS-managed or associated networks. However, if a request with a Kubernetes service account identity originates from an external ASN (i.e., not <code>Amazon.com, Inc.</code>), it raises suspicion that the token might have been exfiltrated and is being used from an unauthorized location. This rule is designed to highlight such anomalies, prompting further investigation into possible token theft or misconfiguration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains unauthorized access to a Kubernetes service account token within a compromised pod or through other means.</li>
<li>Attacker exfiltrates the service account token from the Kubernetes cluster.</li>
<li>The attacker uses the exfiltrated token to call the AWS STS <code>AssumeRoleWithWebIdentity</code> API.</li>
<li>The <code>AssumeRoleWithWebIdentity</code> call is made from a network with an ASN organization name that is not <code>Amazon.com, Inc.</code>.</li>
<li>AWS CloudTrail logs the successful <code>AssumeRoleWithWebIdentity</code> event, including details about the user, source IP, and ASN organization.</li>
<li>The compromised IAM role is used to perform unauthorized actions within the AWS environment.</li>
<li>These actions could include data exfiltration, resource modification, or further lateral movement within the cloud infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack of this nature can lead to significant security breaches within an AWS environment. An attacker leveraging stolen service account tokens can gain unauthorized access to sensitive resources, leading to data breaches, service disruption, or financial loss. This is especially concerning for organizations heavily reliant on Kubernetes and AWS, as it can undermine the security of their cloud-native applications and infrastructure. While the number of affected organizations is unknown, the potential impact on those targeted can be severe, leading to substantial remediation costs and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>AWS AssumeRoleWithWebIdentity from Kubernetes SA and External ASN</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule by following the investigation steps in the rule&rsquo;s <code>note</code> field.</li>
<li>Expand the <code>source.as.organization.name</code> exclusions in the Sigma rule for known and trusted egress paths if needed.</li>
<li>Enable geolocation/ASN enrichment for your AWS CloudTrail logs to accurately identify the source of <code>AssumeRoleWithWebIdentity</code> calls.</li>
<li>Regularly review and rotate IRSA trust relationships to minimize the impact of compromised service account tokens.</li>
<li>Revoke the role session, rotate IRSA trust where appropriate, investigate token exposure, and reduce service account and role permissions if unauthorized access is suspected.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>iam</category><category>kubernetes</category><category>initial-access</category><category>web-identity</category></item><item><title>S3 Browser Used to Create IAM Login Profiles</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-s3browser-iam-loginprofile/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-s3browser-iam-loginprofile/</guid><description>The S3 Browser utility is being used to enumerate IAM users lacking login profiles and subsequently create them, potentially for reconnaissance, persistence, and privilege escalation within AWS environments.</description><content:encoded><![CDATA[<p>The threat involves the use of the S3 Browser utility, a Windows application, to interact with Amazon Web Services (AWS) Identity and Access Management (IAM). Attackers are leveraging S3 Browser to perform reconnaissance, specifically targeting IAM users that do not have a login profile configured. Upon identifying such users, the attacker proceeds to create a login profile for them. This tactic may be indicative of an attempt to gain unauthorized access or maintain persistence within the AWS environment. The activity is detectable via AWS CloudTrail logs and was first publicly reported in May 2023 in connection with the threat actor GUIVIL.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system with AWS CLI tools installed or uses a compromised IAM user with sufficient permissions.</li>
<li>The attacker configures S3 Browser with valid AWS credentials, enabling interaction with the AWS environment.</li>
<li>S3 Browser initiates a <code>GetLoginProfile</code> API call in AWS CloudTrail, to enumerate IAM users and identify those without existing login profiles.</li>
<li>S3 Browser, upon finding an IAM user without a login profile, initiates a <code>CreateLoginProfile</code> API call.</li>
<li>The attacker sets a password for the newly created login profile, gaining console access to the targeted IAM user account.</li>
<li>The attacker logs into the AWS console using the newly created credentials.</li>
<li>The attacker leverages the IAM user&rsquo;s permissions to perform further reconnaissance, lateral movement, or data exfiltration within the AWS environment.</li>
<li>The attacker establishes persistence by maintaining access through the created login profile, even if other access methods are revoked.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain unauthorized console access to previously unprotected IAM user accounts. This can lead to privilege escalation, data breaches, and disruption of cloud services. The lack of multi-factor authentication on newly created login profiles increases the risk of account compromise. The impact can range from reconnaissance to full-scale control of the AWS environment, depending on the permissions associated with the compromised IAM users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>GetLoginProfile</code> and <code>CreateLoginProfile</code> events originating from the S3 Browser user agent in AWS CloudTrail logs.</li>
<li>Investigate any instances of IAM LoginProfile creation originating from unusual user agents or IP addresses.</li>
<li>Implement multi-factor authentication (MFA) for all IAM users, including those with console access to mitigate the impact of compromised credentials.</li>
<li>Review IAM policies to ensure least privilege and restrict the ability to create or modify LoginProfiles to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloud</category><category>iam</category><category>s3browser</category><category>privilege-escalation</category><category>persistence</category></item></channel></rss>