<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Security-Service — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/security-service/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/security-service/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS Security Services Configuration Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-security-services-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-security-services-deletion/</guid><description>Detection of deletion of critical AWS Security Services configurations like CloudWatch alarms, GuardDuty detectors, and Web Application Firewall rules to evade detection, potentially leading to data breaches and unauthorized access.</description><content:encoded><![CDATA[<p>This threat brief addresses the tactic of adversaries deleting critical AWS security service configurations to evade detection. This includes deleting CloudWatch alarms, GuardDuty detectors, and Web Application Firewall (WAF) rules. The activity is identified through specific API calls such as &ldquo;DeleteLogStream&rdquo;, &ldquo;DeleteDetector&rdquo;, &ldquo;DeleteIPSet&rdquo;, &ldquo;DeleteWebACL&rdquo;, &ldquo;DeleteRule&rdquo;, &ldquo;DeleteRuleGroup&rdquo;, &ldquo;DeleteLoggingConfiguration&rdquo;, and &ldquo;DeleteAlarms&rdquo; within Amazon Security Lake logs. By successfully removing or impairing these services, attackers can operate undetected within an AWS environment, increasing the risk of data breaches, unauthorized access, and persistent compromise. The scope includes any AWS environment utilizing the mentioned security services and logging via Amazon Security Lake.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the AWS environment, potentially through compromised credentials or exploiting a vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to obtain the necessary permissions to modify or delete security service configurations.</li>
<li><strong>Discovery:</strong> The attacker enumerates existing security configurations, such as CloudWatch alarms, GuardDuty detectors, and WAF rules, to identify targets for deletion.</li>
<li><strong>Defense Evasion - Service Deletion:</strong> The attacker executes API calls like <code>DeleteLogStream</code>, <code>DeleteDetector</code>, <code>DeleteIPSet</code>, <code>DeleteWebACL</code>, <code>DeleteRule</code>, <code>DeleteRuleGroup</code>, <code>DeleteLoggingConfiguration</code>, or <code>DeleteAlarms</code> to delete security service configurations.</li>
<li><strong>Persistence:</strong> With security monitoring impaired, the attacker establishes persistence mechanisms, such as creating new IAM users or roles with excessive permissions, or deploying backdoors within EC2 instances.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally through the AWS environment, accessing sensitive data and resources.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrates sensitive data from the compromised AWS environment.</li>
<li><strong>Impact:</strong> The attacker achieves their objective, which could include data theft, disruption of services, or financial gain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of AWS security services can have severe consequences, potentially affecting any organization using AWS. Consequences range from data breaches and unauthorized resource access to prolonged persistence of malicious actors within the AWS environment. The number of affected victims and the scope of damage depends on the scale of the AWS environment and the sensitivity of the data stored within. Organizations in all sectors are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect the deletion of critical AWS security service configurations based on Amazon Security Lake logs.</li>
<li>Investigate any identified instances of API calls related to the deletion of security services (e.g., &ldquo;DeleteLogStream&rdquo;, &ldquo;DeleteDetector&rdquo;) using the provided Sigma rule.</li>
<li>Implement multi-factor authentication (MFA) for all IAM users and roles to reduce the risk of compromised credentials.</li>
<li>Review and restrict IAM policies to ensure that users and roles have only the necessary permissions to perform their duties.</li>
<li>Monitor CloudTrail logs for unusual activity, such as unexpected API calls or changes to IAM policies.</li>
<li>Regularly audit AWS security configurations to ensure that they are properly configured and maintained.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>defense-evasion</category><category>security-service</category></item></channel></rss>