<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>attack.t1685.002 on Detection.FYI</title>
    <link>https://detection.fyi/tags/attack.t1685.002/</link>
    <description>Recent content in attack.t1685.002 on Detection.FYI</description>
    <generator>Hugo -- gohugo.io</generator>
    <copyright> </copyright>
    <lastBuildDate>Tue, 28 Apr 2026 23:20:23 +0000</lastBuildDate><atom:link href="https://detection.fyi/tags/attack.t1685.002/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>AWS CloudTrail Important Change</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_disable_logging/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_disable_logging/</guid>
      <description>
        
          
            Detects disabling, deleting and updating of a Trail
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS Config Disabling Channel/Recorder</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_config_disable_recording/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_config_disable_recording/</guid>
      <description>
        
          
            Detects AWS Config Service disabling
          
          
        
      </description>
    </item>
    
    <item>
      <title>AWS GuardDuty Detector Deleted Or Updated</title>
      <link>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_guardduty_detector_deleted_or_updated/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_cloudtrail_guardduty_detector_deleted_or_updated/</guid>
      <description>
        
          
            Detects successful deletion or disabling of an AWS GuardDuty detector, possibly by an attacker trying to avoid detection of its malicious activities.
Upon deletion, GuardDuty stops monitoring the environment and all existing findings are lost.
Verify with the user identity that this activity is legitimate.

          
          
        
      </description>
    </item>
    
  </channel>
</rss>
