Network utility accessed risky cloud metadata service

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when a network utility (like cURL or Wget) is used to access the cloud Instance Metadata Service (IMDS) in an interactive session.

Strategy

The IMDS is a link-local HTTP endpoint that provides data about a given cloud instance. One function is to provide temporary security credentials so that they do not need to be stored on the host. Because IMDS can be used to fetch security credentials, attackers may use it to escalate privileges in order to access other cloud resources. This detection identifies when Linux network utilities are used in an interactive session to access the metadata service. It is unusual for this activity to occur interactively, especially in production environments.

Triage & Response

  1. Determine whether or not this is expected behavior. For example, did an employee run commands for an approved reason, or did a configuration management utility use an interactive session?
  2. If this behavior is unexpected, attempt to contain the compromise (possibly by terminating the workload, depending on the stage of attack) and look for indications of the initial compromise. Follow your organization’s internal processes for investigating and remediating compromised systems.
  3. Determine the nature of the attack and the tools involved. Investigate security signals (if present) occurring around the time of the event to establish an attack path.
  4. Using cloud audit logs, identify if the attached identity was misused.
  5. Find and repair the root cause of the exploit.

Requires Agent version 7.27 or later.

PREVIEWING: may/unit-testing