Rule Library

Sigma Rules

55 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

AWS Snapshot Backup Exfiltration

Detects the modification of an EC2 snapshot's permissions to enable access from another account

AWScloudtrail
TA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Darin SmithMon May 17cloud
Detectionhightest

AWS Identity Center Identity Provider Change

Detects a change in the AWS Identity Center (FKA AWS SSO) identity provider. A change in identity provider allows an attacker to establish persistent access or escalate privileges via user impersonation.

AWScloudtrail
TA0003 · PersistenceTA0006 · Credential AccessTA0005 · Defense EvasionT1556 · Modify Authentication Process
Michael McIntyreWed Sep 27cloud
Detectionlowtest

AWS STS AssumeRole Misuse

Identifies the suspicious use of AssumeRole. Attackers could move laterally and escalate privileges.

AWScloudtrail
TA0008 · Lateral MovementTA0004 · Privilege EscalationTA0005 · Defense EvasionT1548 · Abuse Elevation Control Mechanism+2
Austin SongerSat Jul 24cloud
Detectionmediumexperimental

AWS STS GetCallerIdentity Enumeration Via TruffleHog

Detects the use of TruffleHog for AWS credential validation by identifying GetCallerIdentity API calls where the userAgent indicates TruffleHog. Threat actors leverage TruffleHog to enumerate and validate exposed AWS keys. Successful exploitation allows threat actors to confirm the validity of compromised AWS credentials, facilitating further unauthorized access and actions within the AWS environment.

AWScloudtrail
TA0007 · DiscoveryT1087.004 · Cloud Account
Adan AlvarezSun Oct 12cloud
Detectionlowtest

AWS STS GetSessionToken Misuse

Identifies the suspicious use of GetSessionToken. Tokens could be created and used by attackers to move laterally and escalate privileges.

AWScloudtrail
TA0008 · Lateral MovementTA0004 · Privilege EscalationTA0005 · Defense EvasionT1548 · Abuse Elevation Control Mechanism+2
Austin SongerSat Jul 24cloud
Detectionmediumtest

AWS Suspicious SAML Activity

Identifies when suspicious SAML activity has occurred in AWS. An adversary could gain backdoor access via SAML.

AWScloudtrail
TA0005 · Defense EvasionTA0001 · Initial AccessTA0008 · Lateral MovementTA0003 · Persistence+5
Austin SongerWed Sep 22cloud
Detectionhightest

AWS User Login Profile Was Modified

Detects activity when someone is changing passwords on behalf of other users. An attacker with the "iam:UpdateLoginProfile" permission on other users can change the password used to login to the AWS console on any user that already has a login profile setup.

AWScloudtrail
TA0003 · PersistenceTA0004 · Privilege EscalationT1098 · Account Manipulation
toffeebr33kMon Aug 09cloud