05135ec828
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
24 lines
748 B
YAML
24 lines
748 B
YAML
title: SES Identity Has Been Deleted
|
|
id: 20f754db-d025-4a8f-9d74-e0037e999a9a
|
|
status: experimental
|
|
description: Detects an instance of an SES identity being deleted via the "DeleteIdentity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities
|
|
references:
|
|
- https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/
|
|
author: Janantha Marasinghe
|
|
date: 2022/12/13
|
|
modified: 2022/12/28
|
|
tags:
|
|
- attack.defense_evasion
|
|
- attack.t1070
|
|
logsource:
|
|
product: aws
|
|
service: cloudtrail
|
|
detection:
|
|
selection:
|
|
eventSource: 'ses.amazonaws.com'
|
|
eventName: 'DeleteIdentity'
|
|
condition: selection
|
|
falsepositives:
|
|
- Unknown
|
|
level: medium
|