2020-02-12 21:09:16 +00:00
title : AWS IAM Backdoor Users Keys
2020-02-12 20:22:38 +00:00
id : 0a5177f4-6ca9-44c2-aacf-d3f3d8b6e4d2
status : experimental
2020-09-14 04:03:04 +00:00
description : Detects AWS API key creation for a user by another user. Backdoored users can be used to obtain persistence in the AWS environment. Also with this alert, you can detect a flow of AWS keys in your org.
2020-02-12 20:22:38 +00:00
author : faloker
date : 2020 /02/12
2020-09-03 14:16:47 +00:00
modified : 2020 /09/01
2020-02-12 20:22:38 +00:00
references :
2020-02-12 20:48:46 +00:00
- https://github.com/RhinoSecurityLabs/pacu/blob/master/modules/iam__backdoor_users_keys/main.py#L6
2020-02-12 20:22:38 +00:00
logsource :
2020-02-12 20:48:46 +00:00
service : cloudtrail
2020-02-12 20:22:38 +00:00
detection :
2020-02-12 20:48:46 +00:00
selection_source :
- eventSource : iam.amazonaws.com
selection_eventname :
- eventName : CreateAccessKey
filter :
userIdentity.arn|contains : responseElements.accessKey.userName
condition : all of selection* and not filter
2020-02-12 20:22:38 +00:00
fields :
2020-02-12 20:48:46 +00:00
- userIdentity.arn
- responseElements.accessKey.userName
- errorCode
- errorMessage
2020-02-12 20:22:38 +00:00
falsepositives :
- Adding user keys to their own accounts (the filter cannot cover all possible variants of user naming)
- AWS API keys legitimate exchange workflows
2020-09-14 04:03:04 +00:00
level : medium
2020-02-12 20:22:38 +00:00
tags :
2020-09-03 14:16:47 +00:00
- attack.persistence
2020-02-12 20:48:46 +00:00
- attack.t1098