[New Rule] Add AWS Password Recovery Requested

This commit is contained in:
seth-goodwin
2020-07-07 09:37:17 -07:00
committed by Ross Wolf
parent 8052a1ea1f
commit cae5fee025
@@ -0,0 +1,50 @@
[metadata]
creation_date = "2020/07/02"
ecs_version = ["1.5.0"]
maturity = "production"
updated_date = "2020/07/02"
[rule]
author = ["Elastic"]
description = """
Identifies AWS IAM password recovery requests. An adversary may attempt to gain unauthorized AWS access by abusing
password recovery mechanisms.
"""
false_positives = [
"""
Verify whether the user identity, user agent, and/or hostname should be requesting changes in your environment.
Password reset attempts from unfamiliar users should be investigated. If known behavior is causing false positives,
it can be exempted from the rule.
""",
]
from = "now-20m"
index = ["filebeat-*"]
interval = "10m"
language = "kuery"
license = "Elastic License"
name = "AWS IAM Password Recovery Requested"
references = ["https://www.cadosecurity.com/2020/06/11/an-ongoing-aws-phishing-campaign/"]
risk_score = 21
rule_id = "69c420e8-6c9e-4d28-86c0-8a2be2d1e78c"
severity = "low"
tags = ["AWS", "Elastic"]
type = "query"
query = '''
event.action:PasswordRecoveryRequested and event.provider:signin.amazonaws.com and event.outcome:success
'''
[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1078"
name = "Valid Accounts"
reference = "https://attack.mitre.org/techniques/T1078/"
[rule.threat.tactic]
id = "TA0001"
name = "Initial Access"
reference = "https://attack.mitre.org/tactics/TA0001/"