<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>MongoDB, Inc. — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/mongodb-inc./</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 20:57:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/mongodb-inc./feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS EC2 Role GetCallerIdentity from New Source AS Organization</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-aws-ec2-role-getcalleridentity/</link><pubDate>Fri, 01 May 2026 20:57:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-aws-ec2-role-getcalleridentity/</guid><description>The rule detects when an EC2 instance role session calls AWS STS GetCallerIdentity from a new source autonomous system (AS) organization name, indicating potential credential theft and verification from outside expected egress paths.</description><content:encoded><![CDATA[<p>This detection identifies when an EC2 instance role session calls the AWS STS GetCallerIdentity API from a source Autonomous System (AS) Organization name that has not been previously observed. The GetCallerIdentity API is often used by adversaries to validate stolen instance role credentials from infrastructure outside the victim&rsquo;s normal egress points. By baselining the combination of identity and source network, the rule reduces noise associated with stable NAT or AWS-classified egress, focusing on truly novel access patterns. This detection is specifically designed to complement other rules that may detect general GetCallerIdentity calls, by excluding previously seen combinations of user identity and source AS organization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an EC2 instance through methods like exploiting a Server-Side Request Forgery (SSRF) vulnerability, compromising application code or exploiting IMDS abuse.</li>
<li>The attacker leverages the instance&rsquo;s IAM role to obtain temporary AWS credentials.</li>
<li>The attacker attempts to validate the stolen credentials using the <code>GetCallerIdentity</code> API call.</li>
<li>The <code>GetCallerIdentity</code> API call originates from an IP address associated with a new and unexpected Autonomous System Organization (ASO).</li>
<li>The AWS CloudTrail logs record the <code>GetCallerIdentity</code> event, including the user identity ARN and the source AS organization name.</li>
<li>The detection rule triggers due to the new combination of user identity and source AS organization.</li>
<li>The attacker uses the validated credentials to perform reconnaissance and identify valuable resources within the AWS environment (e.g., S3 buckets, databases).</li>
<li>The attacker attempts to exfiltrate sensitive data or deploy malicious workloads using the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data stored within the AWS environment. The attacker may be able to escalate privileges, compromise other resources, and disrupt services. The potential impact includes data breaches, financial loss, and reputational damage. The lack of specific victim counts or sectors targeted suggests a broad applicability across various AWS users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS EC2 Role GetCallerIdentity from New Source AS Organization&rdquo; to your SIEM to detect suspicious activity.</li>
<li>Investigate alerts triggered by the Sigma rule, focusing on the <code>aws.cloudtrail.user_identity.arn</code> and <code>source.as.organization.name</code> fields.</li>
<li>Monitor AWS CloudTrail logs for <code>GetCallerIdentity</code> API calls, particularly those originating from unfamiliar source IP addresses and ASNs.</li>
<li>Revoke compromised IAM role sessions by stopping the affected EC2 instances or removing the role from the instance profile.</li>
<li>Rotate any long-lived secrets accessible by the EC2 instance, based on the <code>aws.cloudtrail.user_identity.access_key_id</code>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>getcalleridentity</category><category>ec2</category><category>discovery</category></item></channel></rss>