<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sts — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sts/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 10 Apr 2026 16:48:32 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sts/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS STS GetCallerIdentity API Called for the First Time</title><link>https://feed.craftedsignal.io/briefs/2024-10-aws-sts-getcalleridentity/</link><pubDate>Fri, 10 Apr 2026 16:48:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-aws-sts-getcalleridentity/</guid><description>An adversary with access to compromised AWS credentials may attempt to verify their validity and determine the account they are using by calling the STS GetCallerIdentity API, potentially indicating credential compromise and unauthorized discovery activity.</description><content:encoded><![CDATA[<p>The AWS Security Token Service (STS) GetCallerIdentity API allows a user to retrieve information about the IAM user or role associated with the credentials being used. While a legitimate user should already know the account they are operating in, an attacker with compromised credentials may use this API to verify the validity of the credentials and enumerate account details. This activity, especially when observed for the first time from a particular user identity, can indicate malicious reconnaissance. This detection focuses on identifying the initial use of the GetCallerIdentity API, excluding instances where an assumed role is involved due to the common practice of using GetCallerIdentity after assuming a role. This event is flagged as anomalous, potentially signaling unauthorized access or credential misuse within an AWS environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to AWS credentials, either through phishing, credential stuffing, or compromised systems.</li>
<li>The attacker uses the compromised credentials to authenticate to the AWS environment.</li>
<li>The attacker executes the <code>sts:GetCallerIdentity</code> API call to identify the associated AWS account ID, IAM user, or role.</li>
<li>The AWS STS service processes the request and returns the identity information to the attacker.</li>
<li>The attacker analyzes the returned identity information to understand the scope and privileges of the compromised credentials.</li>
<li>The attacker uses the gathered information to perform further reconnaissance activities, such as identifying accessible resources and services.</li>
<li>Based on the discovered information, the attacker may attempt to escalate privileges or move laterally within the AWS environment.</li>
<li>The final objective could include data exfiltration, deployment of malicious workloads, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and undetected reconnaissance can lead to significant damage, including unauthorized access to sensitive data, compromised workloads, and disruption of critical services. The impact can range from data breaches and financial losses to reputational damage and regulatory fines. Depending on the scope of the compromised credentials, the attacker may be able to access and control a large portion of the AWS environment. In the event of a breach, the organization may incur costs related to incident response, data recovery, and legal settlements.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS STS GetCallerIdentity API Called for the First Time by New Identity&rdquo; to your SIEM and tune for your environment to detect anomalous usage of the GetCallerIdentity API.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the source IP address, user agent, and the user identity associated with the API call.</li>
<li>Review IAM permission policies for the user identity associated with the GetCallerIdentity API call to ensure the least privilege principle is followed.</li>
<li>Enable AWS CloudTrail logging for all AWS regions in your account to ensure comprehensive event logging, as required by the detection rule.</li>
<li>Consider adding exceptions based on <code>user.id</code> or <code>aws.cloudtrail.user_identity.arn</code> values for automation workflows that legitimately rely on the GetCallerIdentity API, as mentioned in the overview.</li>
<li>Implement multi-factor authentication (MFA) for all IAM users to mitigate the risk of credential compromise, as suggested in the documentation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>sts</category><category>discovery</category></item><item><title>Suspicious AWS STS GetSessionToken Usage</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-sts-getsessiontoken-misuse/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-sts-getsessiontoken-misuse/</guid><description>The AWS STS GetSessionToken API is being misused to create temporary tokens for lateral movement and privilege escalation within AWS environments by potentially compromised IAM users.</description><content:encoded><![CDATA[<p>The AWS Security Token Service (STS) GetSessionToken API allows IAM users to create temporary security credentials. Attackers can abuse this functionality by generating tokens with elevated privileges or for lateral movement within an AWS environment if an IAM user&rsquo;s credentials have been compromised. This activity can be difficult to detect as GetSessionToken is a legitimate function, but unusual patterns or IAM users generating tokens where it is not expected should be investigated. This activity is of particular concern because it bypasses normal IAM role assumption logging and creates a separate credential for an attacker to abuse, making access more difficult to track. The impact is significant, allowing attackers to perform actions as the compromised IAM user or escalate privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS environment, potentially through compromised IAM user credentials.</li>
<li>The attacker authenticates to AWS using the compromised IAM user credentials.</li>
<li>The attacker calls the STS GetSessionToken API, specifying desired permissions or roles (if permitted by the IAM user&rsquo;s policies).</li>
<li>AWS STS generates a new set of temporary credentials (access key ID, secret access key, and session token).</li>
<li>The attacker configures their AWS CLI or SDK to use the newly acquired temporary credentials.</li>
<li>The attacker leverages these temporary credentials to perform actions within the AWS environment, potentially escalating privileges or moving laterally.</li>
<li>The attacker covers their tracks by deleting the CloudTrail logs.</li>
<li>The attacker exfiltrates sensitive data, deploys malware, or causes disruption within the AWS environment using the acquired privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised AWS environments can lead to data breaches, service disruptions, and financial losses. Successful exploitation via GetSessionToken misuse allows attackers to move laterally, escalate privileges, and perform unauthorized actions within the AWS infrastructure. The number of affected organizations is currently unknown, but any organization relying on AWS is potentially at risk. If successful, attackers can steal sensitive data, compromise critical systems, and disrupt business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS STS GetSessionToken Misuse&rdquo; to your SIEM to detect suspicious GetSessionToken API calls (see rules section).</li>
<li>Investigate GetSessionToken calls where <code>userIdentity.type</code> is <code>IAMUser</code> to determine if the request is legitimate.</li>
<li>Monitor CloudTrail logs for unusual patterns of GetSessionToken usage, particularly from unfamiliar user agents or hosts.</li>
<li>Implement strong IAM policies and MFA to minimize the risk of compromised IAM user credentials.</li>
<li>Review the false positives section of the Sigma rule to tune the rule for your specific environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>cloud</category><category>lateral-movement</category><category>privilege-escalation</category><category>sts</category><category>GetSessionToken</category></item><item><title>AWS STS GetFederationToken with AdministratorAccess in Request</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-sts-admin-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-sts-admin-access/</guid><description>Detection of AWS STS GetFederationToken calls with AdministratorAccess in the request parameters, indicating potential privilege escalation or dangerous automation via broadly privileged temporary credentials.</description><content:encoded><![CDATA[<p>The AWS Security Token Service (STS) GetFederationToken API allows for the creation of temporary security credentials for federated users. These credentials inherit permissions from the calling IAM user and any session policy included in the request. This detection focuses on instances where the request parameters of GetFederationToken reference AdministratorAccess, either directly or through an equivalent string. The inclusion of AdministratorAccess within the session policy grants overly broad privileges to the temporary credentials, potentially leading to privilege escalation or abuse. This scenario is often indicative of legacy systems, misconfigured tooling, or malicious intent, posing a significant risk to the security posture of AWS environments. Defenders should prioritize identifying and mitigating instances of this behavior to enforce least privilege principles and prevent unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised IAM user credentials or an exploited vulnerability.</li>
<li>The attacker identifies an IAM user with the necessary permissions to call the STS GetFederationToken API.</li>
<li>The attacker crafts a GetFederationToken API request, including a session policy that directly references &ldquo;AdministratorAccess&rdquo; or includes a policy ARN that grants administrator privileges.</li>
<li>The GetFederationToken API call is successfully executed, generating temporary security credentials with broad administrator permissions.</li>
<li>The attacker uses the temporary credentials to perform privileged actions within the AWS environment, such as modifying IAM policies, accessing sensitive data, or deploying malicious resources.</li>
<li>The attacker may attempt to laterally move within the AWS environment by leveraging the newly acquired administrator privileges to compromise other resources or accounts.</li>
<li>The attacker could establish persistence by creating new IAM users or roles with elevated permissions, ensuring continued access even after the temporary credentials expire.</li>
<li>The attacker achieves their final objective, which could include data exfiltration, service disruption, or financial gain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to complete compromise of the AWS environment. An attacker with temporary administrator credentials can modify security configurations, access sensitive data, and disrupt critical services. While no specific victim counts or sectors are mentioned, the broad permissions granted by AdministratorAccess make any AWS environment vulnerable to significant damage. The risk score of 73 highlights the potential for severe impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS STS GetFederationToken with AdministratorAccess in Request&rdquo; to your SIEM to detect instances of this activity (rule title).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the <code>aws.cloudtrail.request_parameters</code> to identify the specific policy being used (rule title).</li>
<li>Revoke or rotate the IAM user access keys involved in the GetFederationToken call and enforce least privilege on the user (rule description).</li>
<li>Monitor CloudTrail logs for subsequent events using <code>response_elements.credentials.accessKeyId</code> from the same response to identify actions taken with the temporary credentials (rule description).</li>
<li>Review and update IAM policies to ensure that session policies used with GetFederationToken adhere to the principle of least privilege (rule description).</li>
<li>Implement automated checks to prevent the creation or modification of IAM policies that grant AdministratorAccess except in explicitly approved scenarios (rule description).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>privilege-escalation</category><category>lateral-movement</category><category>sts</category><category>getfederationtoken</category></item></channel></rss>