SES Identity Has Been Deleted
Detects an instance of an SES identity being deleted via the "DeleteIdentity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities
Sigma rule (View on GitHub)
1title: SES Identity Has Been Deleted
2id: 20f754db-d025-4a8f-9d74-e0037e999a9a
3status: test
4description: Detects an instance of an SES identity being deleted via the "DeleteIdentity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities
5references:
6 - https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/
7author: Janantha Marasinghe
8date: 2022-12-13
9modified: 2022-12-28
10tags:
11 - attack.defense-evasion
12 - attack.t1070
13logsource:
14 product: aws
15 service: cloudtrail
16detection:
17 selection:
18 eventSource: 'ses.amazonaws.com'
19 eventName: 'DeleteIdentity'
20 condition: selection
21falsepositives:
22 - Unknown
23level: medium
References
Related rules
- Clearing Windows Console History
- DLL Load By System Process From Suspicious Locations
- Disable of ETW Trace - Powershell
- ETW Trace Evasion Activity
- EventLog EVTX File Deleted