31 lines
1.3 KiB
YAML
31 lines
1.3 KiB
YAML
title: AWS ECS Backdoor Task Definition
|
|
id: b94bf91e-c2bf-4047-9c43-c6810f43baad
|
|
status: experimental
|
|
description: Detects when an Elastic Container Service (ECS) Task Definition has been modified and run. This can indicate an adversary adding a backdoor to establish persistence or escalate privileges. This rule is based on examining events created upon execution of Rhino Security Lab's Pacu in a lab environment.
|
|
author: Darin Smith
|
|
date: 2022/06/07
|
|
references:
|
|
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/ecs__backdoor_task_def/main.py
|
|
- https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_RegisterTaskDefinition.html
|
|
- https://attack.mitre.org/techniques/T1525
|
|
logsource:
|
|
product: aws
|
|
service: cloudtrail
|
|
detection:
|
|
selection:
|
|
eventSource: ecs.amazonaws.com
|
|
eventName:
|
|
- DescribeTaskDefinition
|
|
- RegisterTaskDefinition
|
|
- RunTask
|
|
requestParameters.containerDefinitions.command|contains|all:
|
|
- '169.254'
|
|
- '$AWS_CONTAINER_CREDENTIALS'
|
|
condition: selection
|
|
level: medium
|
|
tags:
|
|
- attack.persistence
|
|
- attack.t1525
|
|
falsepositives:
|
|
- Task Definition being modified to request credentials from the Task Metadata Service for valid reasons
|