Tor client IP address identified within AWS environment

cloudtrail

Classification:

attack

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect when Tor client activity is seen in AWS CloudTrail management plane logs.

Strategy

This rule monitors AWS CloudTrail management plane logs to determine when an activity had originated from a Tor client. Datadog enriches all ingested logs with expert-curated threat intelligence in real time. An attacker may use a Tor client to anonymize their true origin.

Triage and response

  1. Determine if the actions taken by the identity {{@userIdentity.arn}} are legitimate by looking at past activity and the type of API calls occurring.
  2. If the results of the triage indicate that an attacker has taken the action, begin your company’s incident response process and an investigation.

Changelog

  • 17 August 2023 - Updated query to replace attribute @threat_intel.results.subcategory:tor with @threat_intel.results.category:tor.
PREVIEWING: rtrieu/product-analytics-ui-changes