Potential Storage Enumeration on AWS

Detects potential enumeration activity targeting AWS storage

Sigma rule (View on GitHub)

 1title: Potential Storage Enumeration on AWS
 2id: 4723218f-2048-41f6-bcb0-417f2d784f61
 3related:
 4    - id: f305fd62-beca-47da-ad95-7690a0620084
 5      type: similar
 6status: unsupported
 7description: Detects potential enumeration activity targeting AWS storage
 8references:
 9    - https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/
10author: Janantha Marasinghe
11date: 2022/12/13
12modified: 2023/03/24
13tags:
14    - attack.discovery
15    - attack.t1619
16logsource:
17    product: aws
18    service: cloudtrail
19detection:
20    selection:
21        eventSource: 's3.amazonaws.com'
22        eventName:
23            - 'ListBuckets'
24            - 'GetBucketCors'
25            - 'GetBucketInventoryConfiguration'
26            - 'GetBucketPublicAccessBlock'
27            - 'GetBucketMetricsConfiguration'
28            - 'GetBucketPolicy'
29            - 'GetBucketTagging'
30    timeframe: 10m
31    condition: selection | count() > 5
32falsepositives:
33    - Unknown
34level: medium

References

Related rules

to-top