[Rule Tuning] Potential AWS S3 Bucket Ransomware Note Uploaded (#5739)
Tuning based on telemetry from recent rule version 9. There are many false positives for what look like typical S3 storage object names like `BillingInformation`, `InstanceInformation` created by AWS Service accounts. I'm excluding AWS service account types from the rule for now which eliminated ~97% of the false positives over last 30 days. leaving only 66 which is acceptable for this rule and should be addressed via local exclusions. Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
creation_date = "2024/04/17"
|
||||
integration = ["aws"]
|
||||
maturity = "production"
|
||||
updated_date = "2026/01/30"
|
||||
updated_date = "2026/02/19"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -123,6 +123,7 @@ file where
|
||||
/* common ransom note file name keywords */
|
||||
aws.cloudtrail.resources.arn regex~ "arn:aws:s3:::[^/]+/.*?(how|decrypt|restor|help|instruct|read|get|recov|save|encrypt|info|ransom).*"
|
||||
and not aws.cloudtrail.resources.arn regex~ ".*(AWSLogs|CloudTrail|access-logs).*"
|
||||
and not aws.cloudtrail.user_identity.type == "AWSService"
|
||||
'''
|
||||
|
||||
[rule.investigation_fields]
|
||||
|
||||
Reference in New Issue
Block a user