AWS STS GetCallerIdentity Enumeration Via TruffleHog
Detects the use of TruffleHog for AWS credential validation by identifying GetCallerIdentity API calls where the userAgent indicates TruffleHog. Threat actors leverage TruffleHog to enumerate and validate exposed AWS keys. Successful exploitation allows threat actors to confirm the validity of compromised AWS credentials, facilitating further unauthorized access and actions within the AWS environment.
Sigma rule (View on GitHub)
1title: AWS STS GetCallerIdentity Enumeration Via TruffleHog
2id: 9b1b8e9b-0a5d-4af1-9d2f-4c4b6e7c2c9d
3status: experimental
4description: |
5 Detects the use of TruffleHog for AWS credential validation by identifying GetCallerIdentity API calls where the userAgent indicates TruffleHog.
6 Threat actors leverage TruffleHog to enumerate and validate exposed AWS keys.
7 Successful exploitation allows threat actors to confirm the validity of compromised AWS credentials, facilitating further unauthorized access and actions within the AWS environment.
8references:
9 - https://www.rapid7.com/blog/post/tr-crimson-collective-a-new-threat-group-observed-operating-in-the-cloud/
10 - https://docs.aws.amazon.com/STS/latest/APIReference/API_GetCallerIdentity.html
11 - https://github.com/trufflesecurity/trufflehog
12author: Adan Alvarez @adanalvarez
13date: 2025-10-12
14tags:
15 - attack.discovery
16 - attack.t1087.004
17logsource:
18 product: aws
19 service: cloudtrail
20detection:
21 selection:
22 eventSource: 'sts.amazonaws.com'
23 eventName: 'GetCallerIdentity'
24 userAgent|contains: 'TruffleHog'
25 condition: selection
26falsepositives:
27 - Legitimate internal security scanning or key validation that intentionally uses TruffleHog. Authorize and filter known scanner roles, IP ranges, or assumed roles as needed.
28level: medium
References
Related rules
- RBAC Permission Enumeration Attempt
- Discovery Using AzureHound
- PUA - TruffleHog Execution
- PUA - TruffleHog Execution - Linux
- Local Accounts Discovery