2020-02-12 23:09:16 +02:00
title : AWS EC2 Download Userdata
2020-02-11 23:25:54 +02:00
id : 26ff4080-194e-47e7-9889-ef7602efed0c
status : experimental
2020-09-13 22:03:04 -06:00
description : Detects bulk downloading of User Data associated with AWS EC2 instances. Instance User Data may include installation scripts and hard-coded secrets for deployment.
2020-02-11 23:25:54 +02:00
author : faloker
date : 2020 /02/11
2021-08-20 13:43:00 +01:00
modified : 2021 /08/20
2020-02-11 23:25:54 +02:00
references :
2021-08-20 13:43:00 +01:00
- https://github.com/RhinoSecurityLabs/pacu/blob/master/pacu/modules/ec2__download_userdata/main.py
2020-02-11 23:25:54 +02:00
logsource :
2021-11-14 09:56:59 +01:00
product : aws
2020-02-12 22:48:46 +02:00
service : cloudtrail
2020-02-11 23:25:54 +02:00
detection :
2020-02-12 22:48:46 +02:00
selection_source :
2021-08-09 15:41:40 +02:00
eventSource : ec2.amazonaws.com
requestParameters.attribute : userData
eventName : DescribeInstanceAttribute
2020-02-12 22:48:46 +02:00
timeframe : 30m
2021-08-09 15:41:40 +02:00
condition : selection_source | count() > 10
2020-02-11 23:25:54 +02:00
falsepositives :
- Assets management software like device42
2020-09-13 22:03:04 -06:00
level : medium
2020-02-11 23:25:54 +02:00
tags :
2020-09-03 14:16:47 +00:00
- attack.exfiltration
2020-02-12 22:48:46 +02:00
- attack.t1020