<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ssm — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ssm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 20:57:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ssm/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS SSM Session Manager Child Process Execution Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-ssm-session-manager-abuse/</link><pubDate>Fri, 01 May 2026 20:57:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-ssm-session-manager-abuse/</guid><description>Adversaries abuse AWS Systems Manager (SSM) Session Manager to gain remote execution and lateral movement within AWS environments by spawning malicious child processes from the SSM session worker, leveraging legitimate AWS credentials and IAM permissions.</description><content:encoded><![CDATA[<p>AWS Systems Manager (SSM) Session Manager provides interactive shell access to EC2 instances and hybrid nodes without the need for bastion hosts or open inbound ports. Attackers can abuse this functionality by leveraging compromised AWS credentials or IAM roles with <code>ssm:StartSession</code> permissions to gain unauthorized access to target systems. This allows for remote execution of commands and lateral movement within the AWS environment. The technique involves spawning child processes from the SSM session worker process to perform malicious activities. Defenders should monitor for unusual process execution patterns originating from SSM sessions to identify potential abuse.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to valid AWS credentials or IAM role with <code>ssm:StartSession</code> permissions.</li>
<li>Attacker initiates an SSM session to a target EC2 instance or hybrid node using the compromised credentials.</li>
<li>The <code>ssm-session-worker</code> process is started on the target instance to manage the interactive session.</li>
<li>Attacker executes commands within the session, spawning child processes from the <code>ssm-session-worker</code> process.</li>
<li>Attacker may use scripting languages such as PowerShell or Bash to execute malicious code (e.g., using <code>awsrunPowerShellScript</code> or <code>awsrunShellScript</code>).</li>
<li>These scripts perform reconnaissance, download additional tools, or attempt credential access.</li>
<li>Attacker moves laterally to other instances or resources within the AWS environment.</li>
<li>The ultimate objective is often data exfiltration, privilege escalation, or maintaining persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, compromise of critical systems, and lateral movement within the AWS environment. The impact can range from data breaches to complete control of the compromised infrastructure. The number of affected systems depends on the scope of the compromised credentials and the attacker&rsquo;s ability to move laterally. Organizations using AWS SSM are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect suspicious child processes spawned by <code>ssm-session-worker</code>.</li>
<li>Correlate process activity with AWS CloudTrail logs for <code>StartSession</code> and related API calls to identify the IAM principal initiating the session (see the overview section for API names).</li>
<li>Implement strict IAM policies and regularly review AWS credentials to minimize the risk of credential compromise.</li>
<li>Monitor <code>process.command_line</code>, <code>process.executable</code>, <code>process.user.name</code> for unusual activity within SSM sessions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>ssm</category><category>session-manager</category><category>execution</category><category>cloud</category></item><item><title>AWS SSM Command Document Created by Rare User</title><link>https://feed.craftedsignal.io/briefs/2024-11-aws-ssm-rare-user/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-aws-ssm-rare-user/</guid><description>An AWS Systems Manager (SSM) command document creation by a user or role who does not typically perform this action, which can lead to unauthorized access, command and control, or data exfiltration.</description><content:encoded><![CDATA[<p>This rule identifies when an AWS Systems Manager (SSM) command document is created by a user or role who does not typically perform this action. The rule focuses on detecting anomalous creation of SSM command documents. Adversaries may create SSM command documents to execute commands on managed instances, potentially leading to unauthorized access, command and control, and data exfiltration. The rule utilizes AWS CloudTrail logs to monitor the <code>CreateDocument</code> API call within the SSM service. This activity is flagged when the user or role creating the document deviates from established patterns, indicating a potential security risk. This detection is relevant for organizations using AWS SSM for managing their infrastructure and aims to prevent unauthorized command execution on managed instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised credentials or an exposed IAM role.</li>
<li>The attacker attempts to create a new SSM Command document using the <code>CreateDocument</code> API call.</li>
<li>The <code>CreateDocument</code> API call is logged by AWS CloudTrail with details about the user identity, request parameters, and document description.</li>
<li>The detection rule analyzes CloudTrail logs, specifically looking for the <code>CreateDocument</code> event with a document type of <code>Command</code>.</li>
<li>The rule identifies the user or role associated with the <code>CreateDocument</code> API call by inspecting the <code>aws.cloudtrail.user_identity.arn</code> field.</li>
<li>If the user or role is considered rare or unusual for creating SSM Command documents within the organization, the rule triggers an alert.</li>
<li>The attacker could then use the created document to execute arbitrary commands on managed instances.</li>
<li>Successful execution of these commands leads to various impacts, including unauthorized access, command and control, data exfiltration, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of this technique can lead to unauthorized access to AWS resources, potentially affecting all systems managed by AWS SSM in the targeted environment. The creation of malicious SSM command documents can lead to data exfiltration, system compromise, or denial of service. If successful, this can impact hundreds or thousands of systems depending on the scope of AWS SSM usage in the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS SSM Command Document Created by Rare User&rdquo; to your SIEM, ensuring proper indexing of CloudTrail logs (index = [&ldquo;filebeat-*&rdquo;, &ldquo;logs-aws.cloudtrail-*&rdquo;]).</li>
<li>Review the <code>aws.cloudtrail.request_parameters.content</code> field in the CloudTrail logs for any suspicious commands within the created SSM document.</li>
<li>Restrict SSM document creation permissions to specific, trusted roles or users to prevent unauthorized document creation as mentioned in the overview.</li>
<li>Monitor the <code>SendCommand</code> API call related to the created SSM document to see if it is used to execute commands on managed instances, as described in the triage section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>ssm</category><category>execution</category></item><item><title>AWS EC2 LOLBin Execution via SSM SendCommand</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-ec2-lolbin-ssm/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-ec2-lolbin-ssm/</guid><description>Detection of Living Off the Land Binaries (LOLBins) or GTFOBins execution on EC2 instances via AWS Systems Manager (SSM) SendCommand API, potentially indicating malicious activity.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting the execution of Living Off the Land Binaries (LOLBins) or GTFOBins on Amazon EC2 instances via AWS Systems Manager (SSM) <code>SendCommand</code> API. The technique involves correlating AWS CloudTrail <code>SendCommand</code> events with endpoint process execution by matching SSM command IDs. While AWS redacts command parameters in CloudTrail logs, this correlation technique reveals the actual commands executed on EC2 instances. This is critical because adversaries may abuse SSM to execute malicious commands remotely without requiring SSH or RDP access. They can leverage legitimate system utilities for various malicious purposes, including data exfiltration, establishing reverse shells, or facilitating lateral movement within the cloud environment. The rule was last updated on 2026-04-10.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to AWS via compromised credentials or an exposed IAM role.</li>
<li>The attacker uses the AWS CLI or API to initiate an SSM <code>SendCommand</code> to a target EC2 instance. The <code>DocumentName</code> parameter is set to <code>AWS-RunShellScript</code>.</li>
<li>The SSM agent on the EC2 instance receives the <code>SendCommand</code> request.</li>
<li>The SSM agent executes a shell script (<code>_script.sh</code>) within a dedicated directory for orchestration.</li>
<li>The shell script executes a LOLBin, such as <code>curl</code>, <code>wget</code>, <code>python</code>, or <code>perl</code>, to perform malicious actions. The parent process of the LOLBin will be the SSM shell script.</li>
<li>The LOLBin is used to download a malicious payload, establish a reverse shell, or exfiltrate data.</li>
<li>The attacker uses the established reverse shell to perform further actions on the EC2 instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to EC2 instances, data exfiltration, deployment of malware, and lateral movement within the AWS environment. Although a number of impacted organizations is not available, this attack is able to bypass traditional network security controls. Organizations in any sector utilizing AWS EC2 instances and SSM are potentially at risk. The lack of required SSH or RDP access makes this technique particularly stealthy.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable AWS CloudTrail logging to capture <code>SendCommand</code> events and monitor for <code>AWS-RunShellScript</code> in the <code>request_parameters</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect AWS EC2 LOLBin Execution via SSM SendCommand&rdquo; to your SIEM and tune for your environment.</li>
<li>Monitor endpoint process execution logs for the execution of LOLBins like <code>curl</code>, <code>wget</code>, <code>python</code>, <code>perl</code>, <code>nc</code>, etc., with parent processes related to SSM.</li>
<li>Implement strict IAM policies to restrict SSM <code>SendCommand</code> permissions to only authorized users and roles.</li>
<li>Review and audit existing SSM configurations to identify and remediate any overly permissive settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>ec2</category><category>ssm</category><category>lolbin</category><category>execution</category><category>cloud</category></item></channel></rss>