Potential Backup Enumeration on AWS
Detects potential enumeration activity targeting an AWS instance backups
Sigma rule (View on GitHub)
1title: Potential Backup Enumeration on AWS
2id: 76255e09-755e-4675-8b6b-dbce9842cd2a
3status: unsupported
4description: Detects potential enumeration activity targeting an AWS instance backups
5references:
6 - https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/
7author: Janantha Marasinghe
8date: 2022/12/13
9modified: 2023/03/24
10tags:
11 - attack.discovery
12 - attack.t1580
13logsource:
14 product: aws
15 service: cloudtrail
16detection:
17 selection:
18 eventSource: 'ec2.amazonaws.com'
19 eventName:
20 - 'GetPasswordData'
21 - 'GetEbsEncryptionByDefault'
22 - 'GetEbsDefaultKmsKeyId'
23 - 'GetBucketReplication'
24 - 'DescribeVolumes'
25 - 'DescribeVolumesModifications'
26 - 'DescribeSnapshotAttribute'
27 - 'DescribeSnapshotTierStatus'
28 - 'DescribeImages'
29 timeframe: 10m
30 condition: selection | count() > 5
31falsepositives:
32 - Unknown
33level: medium
References
Related rules
- Account Enumeration on AWS
- Enumeration via the Global Catalog
- Network Scans Count By Destination IP
- Network Scans Count By Destination Port
- Potential Network Enumeration on AWS