Compromised AWS IAM User Access Key
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。
Goal
Detect an Impossible Travel event when a @userIdentity.type:
{{@userIdentity.type}}
uses an AWS IAM access key and filter out VPNs and AWS Internal IPs.
Strategy
The Impossible Travel detection type’s algorithm compares the GeoIP data of the last log and the current log to determine if the IAM user with @userIdentity.session_name:
{{@userIdentity.session_name}}
traveled more than 500km at over 1,000km/hr and used an AWS IAM access key.
Triage and response
- Determine if the
@userIdentity.accessKeyId:
{{@userIdentity.accessKeyId}}
for @userIdentity.session_name:
{{@userIdentity.session_name}}
should be used from {{@impossible_travel.triggering_locations.first_location.city}}, {{@impossible_travel.triggering_locations.first_location.country}}
and {{@impossible_travel.triggering_locations.second_location.city}}, {{@impossible_travel.triggering_locations.second_location.country}}
. - If the IAM user should not be used from
{{@impossible_travel.triggering_locations.first_location.city}}, {{@impossible_travel.triggering_locations.first_location.country}}
and {{@impossible_travel.triggering_locations.second_location.city}}, {{@impossible_travel.triggering_locations.second_location.country}}
, then consider isolating the account and reset credentials. - Audit any user actions that may have occurred after the illegitimate login.
Changelog
- 7 April 2022 - Updated signal message.
- 3 August 2022 - Fixed null groupby field in query.
- 11 September 2024 - Tuned rule to remove internal network IPs and the three major cloud provider IPs: Azure, AWS, and GCP.
- 30 September 2024 - Updated query to replace attribute
@threat_intel.results.subcategory:anonymizer
.