Vendor
AWS SSM Session Manager Child Process Execution Abuse
2 rules 3 TTPsAdversaries abuse AWS Systems Manager (SSM) Session Manager to gain remote execution and lateral movement within AWS environments by spawning malicious child processes from the SSM session worker, leveraging legitimate AWS credentials and IAM permissions.
AWS IAM Privilege Operations via Lambda Execution Role
2 rules 3 TTPsDetection of IAM API calls that create or empower IAM users and roles, attach policies, or configure instance profiles when the caller is an assumed role session associated with AWS Lambda, potentially indicating privilege escalation or persistence.
AWS EC2 Role GetCallerIdentity from New Source AS Organization
2 rules 1 TTPThe rule detects when an EC2 instance role session calls AWS STS GetCallerIdentity from a new source autonomous system (AS) organization name, indicating potential credential theft and verification from outside expected egress paths.
AWS Discovery API Calls from VPN ASN by New Identity
2 rules 1 TTPThis rule detects the initial use of AWS discovery APIs from VPN-associated ASNs by a previously unseen identity, indicating potential reconnaissance activity.
Local Privilege Escalation Vulnerability 'Copy Fail' in Linux Kernel
2 rules 1 TTP 1 CVEA local privilege escalation vulnerability, dubbed 'Copy Fail' (CVE-2026-31431), affects Linux kernels released since 2017, allowing an unprivileged local attacker to gain root permissions by exploiting a logic bug in the authencesn cryptographic template.
UNC6692 Combines Social Engineering, Malware, and Cloud Abuse
2 rules 12 TTPsUNC6692 is a newly discovered, financially motivated threat actor that combines social engineering via Microsoft Teams, custom malware named SNOWBELT, and abuse of legitimate AWS S3 cloud infrastructure in its attack campaigns to steal credentials and prepare for data exfiltration.
AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure
2 rules 2 TTPsAttackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.
Suspicious AWS EC2 Key Pair Import Activity
2 rules 1 TTPThe import of SSH key pairs into AWS EC2, as detected by CloudTrail logs, may indicate unauthorized access attempts, persistence establishment, or privilege escalation by an attacker.
Detect AWS Route Table Modification via CloudTrail
2 rulesAn attacker may add a new route to an AWS route table, potentially redirecting network traffic for malicious purposes such as defense impairment or data exfiltration.
New AWS Network ACL Entry Creation Detected
2 rules 1 TTPDetection of new Network ACL entries in AWS CloudTrail logs can indicate potential defense impairment or the opening of new attack vectors within an AWS account by an adversary.
Malicious Usage of AWS IMDS Credentials Outside of Expected Services
2 rules 3 TTPsCompromised EC2 instances may be leveraged to exfiltrate and misuse AWS Instance Metadata Service (IMDS) credentials to perform actions outside of the expected AWS Simple Systems Manager (SSM) service, indicating potential lateral movement or data exfiltration.
Potential Abuse of AWS Console GetSigninToken
2 rules 2 TTPsAdversaries may abuse the AWS GetSigninToken API to create temporary federated credentials for obfuscating compromised AWS access keys and pivoting to console sessions without MFA, potentially leading to lateral movement within the AWS environment.
AWS Identity API Access from Rare ASN Organizations
2 rules 1 TTPThis rule detects AWS identities with API traffic dominated by cloud-provider source AS organization labels, but also exhibit traffic from other AS organizations, potentially indicating credential reuse or pivoting.
S3Browser IAM Policy Creation with Default Bucket Name
2 rules 3 TTPsAn AWS IAM policy is created by the S3Browser utility with the default S3 bucket name placeholder, potentially indicating unauthorized access or misconfiguration.
AWS CloudTrail Logging Disabled or Modified
3 rules 1 TTPDetection of AWS CloudTrail being disabled, deleted, or updated by an adversary to impair defenses and evade detection.
AWS KMS Key Policy Updated via PutKeyPolicy
2 rules 2 TTPsDetection of successful PutKeyPolicy calls on AWS KMS keys to identify potential privilege escalation or unauthorized access by adversaries modifying key policies to decrypt or exfiltrate data.
Successful AWS Console Login Without MFA
2 rules 1 TTPSuccessful AWS console logins without multi-factor authentication can indicate compromised credentials, misconfigured security settings, or unauthorized access attempts.
Suspicious AWS SAML Activity Detection
2 rules 3 TTPsThis rule identifies suspicious SAML activity in AWS, such as AssumeRoleWithSAML and UpdateSAMLProvider events, which could indicate an attacker gaining backdoor access, escalating privileges, or establishing persistence.
AWS GuardDuty Detector Deletion or Disablement
3 rulesAttackers may delete or disable AWS GuardDuty detectors to impair defenses and evade detection of malicious activities within the AWS environment.
AWS SES Identity Deletion
2 rules 1 TTPDetection of an AWS Simple Email Service (SES) identity deletion event, potentially indicating an adversary attempting to cover their tracks after malicious activity.
AWS Lateral Movement from Kubernetes Service Account via AssumeRoleWithWebIdentity
2 rules 4 TTPsThis rule detects lateral movement in AWS environments originating from Kubernetes service accounts by identifying instances where credentials obtained for a service account are used for multiple distinct AWS control-plane actions, potentially indicating unauthorized access.
AWS SecurityHub Findings Evasion via API Calls
3 rules 2 TTPsAttackers can impair defenses by modifying or deleting findings and insights within AWS SecurityHub using API calls such as BatchUpdateFindings, DeleteInsight, UpdateFindings, and UpdateInsight.
AWS Identity Center Identity Provider Modification
2 rules 1 TTPAn adversary modifies the AWS Identity Center identity provider configuration, potentially leading to persistent access and privilege escalation through user impersonation.
AWS IAM User or Access Key Creation via S3 Browser
2 rules 2 TTPsThe use of S3 Browser to create IAM users or access keys in AWS environments indicates a potential privilege escalation, persistence, or initial access attempt by threat actors leveraging a known cloud administration tool.
Kerberos Traffic from Unusual Process
2 rules 2 TTPsDetects network connections to the standard Kerberos port from an unusual process other than lsass.exe, potentially indicating Kerberoasting or Pass-the-Ticket activity on Windows systems.
Suspicious Process Accessing Sensitive Identity Files via Auditd
3 rules 2 TTPsThis rule detects suspicious processes, such as copy utilities or scripting tools, accessing sensitive identity files on Linux systems, including Kubernetes tokens, cloud CLI configurations, and root SSH keys, indicating potential credential theft.
Suspicious AWS STS GetSessionToken Usage
2 rules 2 TTPsThe AWS STS GetSessionToken API is being misused to create temporary tokens for lateral movement and privilege escalation within AWS environments by potentially compromised IAM users.
Suspicious AWS EC2 Key Pair Creation from Non-Cloud AS
2 rules 3 TTPsAn AWS EC2 CreateKeyPair event triggered by a new principal originating from a network autonomous system (AS) organization not associated with major cloud providers, indicating potential unauthorized access or persistence activity.
Mshta Making Network Connections Indicative of Defense Evasion
2 rules 1 TTPMshta.exe making outbound network connections may indicate adversarial activity, as it is often used to execute malicious scripts and evade detection by proxying execution of untrusted code.
AWS VPC Flow Logs Deletion for Defense Evasion
2 rules 1 TTPAn adversary may delete VPC Flow Logs in AWS EC2 by calling the DeleteFlowLogs API to evade detection and hinder forensic investigations.
AWS STS GetFederationToken with AdministratorAccess in Request
2 rules 2 TTPsDetection of AWS STS GetFederationToken calls with AdministratorAccess in the request parameters, indicating potential privilege escalation or dangerous automation via broadly privileged temporary credentials.
AWS STS AssumeRole Misuse for Lateral Movement and Privilege Escalation
1 rule 2 TTPsAbuse of AWS STS AssumeRole can allow attackers to move laterally within an AWS environment and escalate privileges, potentially leading to unauthorized access to sensitive resources and data.
AWS IAM Customer Managed Policy Version Manipulation for Privilege Escalation
2 rules 2 TTPsSuccessful creation of new or setting default versions of customer-managed IAM policies can indicate privilege escalation attempts by attackers modifying policy permissions.
AWS EC2 Stop, Start, and User Data Modification Correlation
3 rules 2 TTPsDetection of a sequence of AWS EC2 management API calls indicative of malicious modification of instance user data to execute arbitrary code upon instance restart, potentially leading to privilege escalation and persistence.
AWS EC2 Instance Profile Associated with Running Instance
2 rules 2 TTPsAn attacker may escalate privileges by associating a compromised EC2 instance with a more privileged IAM instance profile.
AWS AssumeRoleWithWebIdentity from Kubernetes SA and External ASN
2 rules 1 TTPDetects successful AWS `AssumeRoleWithWebIdentity` calls where the caller identity is a Kubernetes service account and the source autonomous system organization is not `Amazon.com, Inc.`, which may indicate a stolen or misused projected service-account token being exchanged for IAM credentials off-cluster.
AWS Root Account Usage Detected
3 rules 3 TTPsThe AWS root account, which grants unrestricted access to all resources within an AWS account, was used, potentially indicating unauthorized activity, privilege escalation, or a breach of security best practices.
AWS S3 Bucket Deletion Detected via CloudTrail
3 rules 1 TTPAn AWS S3 bucket deletion event was detected via CloudTrail logs, potentially indicating data loss or unauthorized access attempts.
S3 Browser Used to Create IAM Login Profiles
2 rules 2 TTPsThe S3 Browser utility is being used to enumerate IAM users lacking login profiles and subsequently create them, potentially for reconnaissance, persistence, and privilege escalation within AWS environments.
AWS GuardDuty IP Set Manipulation for Defense Impairment
2 rules 1 TTPAn attacker modifies AWS GuardDuty IP sets, potentially whitelisting malicious IPs to disable security alerts and impair defenses.
AWS Config Service Disabling Detection
2 rules 1 TTPDetection of AWS Config Service disabling, potentially indicating an attempt to impair defenses by stopping configuration recording and delivery.