<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Securityhub — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/securityhub/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/securityhub/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS SecurityHub Findings Evasion via API Calls</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-securityhub-evasion/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-securityhub-evasion/</guid><description>Attackers can impair defenses by modifying or deleting findings and insights within AWS SecurityHub using API calls such as BatchUpdateFindings, DeleteInsight, UpdateFindings, and UpdateInsight.</description><content:encoded><![CDATA[<p>Attackers with sufficient AWS privileges can manipulate SecurityHub findings to evade detection and maintain persistence within a compromised environment. This involves using SecurityHub&rsquo;s API to either modify existing findings, delete insights altogether, or update insights to mask malicious activity. This activity is conducted via API calls to <code>securityhub.amazonaws.com</code>, specifically targeting the <code>BatchUpdateFindings</code>, <code>DeleteInsight</code>, <code>UpdateFindings</code>, and <code>UpdateInsight</code> actions. Successful evasion allows malicious actors to operate without triggering alarms or attracting attention from security personnel, leading to prolonged compromise and potentially greater damage. This is especially critical in production environments where SecurityHub findings are actively monitored.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an AWS account, potentially through compromised credentials or exploiting a misconfigured IAM role (T1078).</li>
<li>The attacker enumerates existing SecurityHub findings and insights to identify potential targets for modification or deletion.</li>
<li>The attacker calls the <code>BatchUpdateFindings</code> API to modify the severity, confidence, or resolution status of specific findings, effectively silencing alerts (T1562.003).</li>
<li>Alternatively, the attacker calls the <code>UpdateFindings</code> API to modify individual findings.</li>
<li>The attacker calls the <code>DeleteInsight</code> API to remove custom insights that could reveal their activities (T1562).</li>
<li>As another option, the attacker calls the <code>UpdateInsight</code> API to modify the criteria of existing insights, causing them to miss malicious activities.</li>
<li>The attacker validates the changes by querying SecurityHub to confirm that the targeted findings and insights have been successfully altered or removed.</li>
<li>The attacker continues malicious activities, such as data exfiltration or lateral movement, with a reduced risk of detection due to the modified SecurityHub state (TA0005).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful evasion of SecurityHub findings can lead to delayed incident response, prolonged attacker presence within the AWS environment, and increased data exfiltration or system compromise. The impact is particularly severe in production environments where SecurityHub is relied upon for real-time threat detection and alerting. By modifying or deleting findings, attackers can effectively blind security teams, enabling them to operate undetected for extended periods. The number of potential victims is directly proportional to the scale of AWS deployments relying on SecurityHub.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS SecurityHub Findings Evasion&rdquo; to your SIEM and tune for your environment to detect suspicious API calls related to findings manipulation (logsource: aws, service: cloudtrail).</li>
<li>Review and harden IAM policies to restrict access to SecurityHub API actions such as <code>BatchUpdateFindings</code>, <code>DeleteInsight</code>, <code>UpdateFindings</code>, and <code>UpdateInsight</code> to only authorized users and roles.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts and roles, especially those with permissions to modify SecurityHub configurations.</li>
<li>Regularly audit CloudTrail logs for suspicious activity related to SecurityHub configuration changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloud</category><category>securityhub</category><category>defense-evasion</category></item></channel></rss>