Further improved several AWS rules (#3827)
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
This commit is contained in:
@@ -1,11 +1,12 @@
|
||||
title: SES Identity Has Been Deleted
|
||||
id: 20f754db-d025-4a8f-9d74-e0037e999a9a
|
||||
status: experimental
|
||||
description: Detects an instance of an SES identity being deleted via the "delete-identity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities
|
||||
description: Detects an instance of an SES identity being deleted via the "DeleteIdentity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities
|
||||
references:
|
||||
- https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/
|
||||
author: Janantha Marasinghe
|
||||
date: 2022/12/13
|
||||
modified: 2022/12/28
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1070
|
||||
@@ -15,7 +16,7 @@ logsource:
|
||||
detection:
|
||||
selection:
|
||||
eventSource: 'ses.amazonaws.com'
|
||||
eventName: 'delete-identity'
|
||||
eventName: 'DeleteIdentity'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
title: Potential Backup Enumeration on An AWS Instance
|
||||
title: Potential Backup Enumeration on AWS
|
||||
id: 76255e09-755e-4675-8b6b-dbce9842cd2a
|
||||
status: experimental
|
||||
description: Detects potential enumeration activity targeting an AWS instance backups
|
||||
@@ -6,6 +6,7 @@ references:
|
||||
- https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/
|
||||
author: Janantha Marasinghe
|
||||
date: 2022/12/13
|
||||
modified: 2022/12/28
|
||||
tags:
|
||||
- attack.discovery
|
||||
- attack.t1580
|
||||
@@ -1,11 +1,12 @@
|
||||
title: Potential Network Enumeration on An AWS Instance
|
||||
title: Potential Network Enumeration on AWS
|
||||
id: c3d53999-4b14-4ddd-9d9b-e618c366b54d
|
||||
status: experimental
|
||||
description: Detects network enumeration performed on an AWS instance.
|
||||
description: Detects network enumeration performed on AWS.
|
||||
references:
|
||||
- https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/
|
||||
author: Janantha Marasinghe
|
||||
date: 2022/12/13
|
||||
modified: 2022/12/28
|
||||
tags:
|
||||
- attack.discovery
|
||||
- attack.t1016
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
title: Potential Storage Enumeration on An AWS Instance
|
||||
title: Potential Storage Enumeration on AWS
|
||||
id: 4723218f-2048-41f6-bcb0-417f2d784f61
|
||||
status: experimental
|
||||
description: Detects potential enumeration activity targeting AWS storage
|
||||
@@ -6,6 +6,7 @@ references:
|
||||
- https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/
|
||||
author: Janantha Marasinghe
|
||||
date: 2022/12/13
|
||||
modified: 2022/12/28
|
||||
tags:
|
||||
- attack.discovery
|
||||
- attack.t1619
|
||||
|
||||
@@ -1,11 +1,12 @@
|
||||
title: Potential Phshing Activity Via AWS Cloud Email Service Abuse
|
||||
title: Potential AWS Cloud Email Service Abuse
|
||||
id: 60b84424-a724-4502-bd0d-cc676e1bc90e
|
||||
status: experimental
|
||||
description: Detects potential phshing activity when the email sending feature is enabled for an account and the email address verification request is dispatched in quick succession
|
||||
description: Detects when the email sending feature is enabled for an AWS account and the email address verification request is dispatched in quick succession
|
||||
references:
|
||||
- https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/
|
||||
author: Janantha Marasinghe
|
||||
date: 2022/12/12
|
||||
modified: 2022/12/28
|
||||
tags:
|
||||
- attack.t1583.006
|
||||
- attack.resource_development
|
||||
|
||||
Reference in New Issue
Block a user