<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>MongoDB — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/mongodb/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 29 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/mongodb/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS Identity API Access from Rare ASN Organizations</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-aws-rare-asn/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-aws-rare-asn/</guid><description>This rule detects AWS identities with API traffic dominated by cloud-provider source AS organization labels, but also exhibit traffic from other AS organizations, potentially indicating credential reuse or pivoting.</description><content:encoded><![CDATA[<p>This detection identifies AWS identities that primarily use API traffic originating from well-known cloud providers (e.g., Amazon, Google, Microsoft), but also exhibit a small amount of traffic from less common Autonomous System (AS) organizations. This pattern can indicate that automation or CI credentials are being reused or pivoted outside of their usual hosted cloud environment. The detection focuses on successful API calls and looks for a combination of high volume from trusted cloud providers and at least one sensitive action originating from an uncommon network. This behavior could be indicative of credential compromise and lateral movement. This rule was published by Elastic on 2026-04-22.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to valid AWS credentials, potentially through phishing, credential stuffing, or exposed secrets.</li>
<li>The attacker uses the compromised credentials to make API calls from their own infrastructure, which is associated with a rare AS organization.</li>
<li>The attacker performs reconnaissance, such as <code>GetCallerIdentity</code>, <code>ListBuckets</code>, or <code>ListSecrets</code>, to understand the AWS environment.</li>
<li>The attacker attempts to escalate privileges by calling <code>AssumeRole</code>, <code>AttachUserPolicy</code>, or <code>CreateAccessKey</code>.</li>
<li>The attacker attempts to access sensitive data using actions such as <code>GetObject</code> or <code>GetSecretValue</code>.</li>
<li>The attacker attempts to create new users or modify existing user profiles using actions such as <code>CreateUser</code>, <code>UpdateLoginProfile</code>, or <code>AddUserToGroup</code>.</li>
<li>The attacker may attempt to invoke cloud ML models using <code>InvokeModel</code> or <code>Converse</code> to further their objectives.</li>
<li>The attacker persists in the environment by creating new IAM users, roles, or policies, or by modifying existing ones.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data stored in S3 buckets, Secrets Manager, or other AWS services. It can also allow the attacker to escalate privileges, create new users, and modify existing configurations, leading to long-term control of the AWS environment. The severity of the impact depends on the level of access granted to the compromised credentials. This can lead to exfiltration of sensitive data, denial of service, or complete compromise of the AWS account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable AWS CloudTrail logging in all regions and send logs to a centralized SIEM or logging platform to enable detection capabilities (<a href="https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference.html">references</a>).</li>
<li>Deploy the Sigma rule &ldquo;AWS Rare Source AS Organization Activity&rdquo; translated from the provided ESQL query to detect unusual source ASNs for AWS API calls.</li>
<li>Investigate alerts generated by the rule, focusing on the <code>user.name</code>, <code>aws.cloudtrail.user_identity.type</code>, <code>Esql.src_asn_values</code>, and <code>Esql.untrusted_suspicious_actions</code> to understand the context of the activity.</li>
<li>Rotate credentials for the affected principal if abuse is suspected and enforce OIDC or short-lived keys for automation.</li>
<li>Tighten IAM and data-plane permissions to limit the impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>initial-access</category><category>credential-access</category></item></channel></rss>