Rule Library

Sigma Rules

55 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumexperimental

AWS Bucket Deleted

Detects the deletion of S3 buckets in AWS CloudTrail logs. Monitoring the deletion of S3 buckets is critical for security and data integrity, as it may indicate potential data loss or unauthorized access attempts.

AWScloudtrail
TA0005 · Defense Evasion
Ivan Saakov+1Sun Oct 19cloud
Detectionmediumexperimental

AWS ConsoleLogin Failed Authentication

Detects failed AWS console login attempts due to authentication failures. Monitoring these events is crucial for identifying potential brute-force attacks or unauthorized access attempts to AWS accounts.

AWScloudtrail
TA0006 · Credential AccessT1110 · Brute Force
Ivan Saakov+1Sun Oct 19cloud
Detectionmediumexperimental

AWS Successful Console Login Without MFA

Detects successful AWS console logins that were performed without Multi-Factor Authentication (MFA). This alert can be used to identify potential unauthorized access attempts, as logging in without MFA can indicate compromised credentials or misconfigured security settings.

AWScloudtrail
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Thuya+1Sat Oct 18cloud
Detectionmediumtest

AWS CloudTrail Important Change

Detects disabling, deleting and updating of a Trail

AWScloudtrail
TA0005 · Defense EvasionT1562.008 · Disable or Modify Cloud Logs
vitaliy0x1Tue Jan 21cloud
Detectionhighexperimental

AWS GuardDuty Detector Deleted Or Updated

Detects successful deletion or disabling of an AWS GuardDuty detector, possibly by an attacker trying to avoid detection of its malicious activities. Upon deletion, GuardDuty stops monitoring the environment and all existing findings are lost. Verify with the user identity that this activity is legitimate.

AWScloudtrail
TA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1562.008 · Disable or Modify Cloud Logs
suktech24Thu Nov 27cloud
Detectionhightest

Malicious Usage Of IMDS Credentials Outside Of AWS Infrastructure

Detects when an instance identity has taken an action that isn't inside SSM. This can indicate that a compromised EC2 instance is being used as a pivot point.

AWScloudtrail
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · Persistence+2
jamesc-grafanaThu Jul 11cloud
Detectionlowtest

New Network ACL Entry Added

Detects that network ACL entries have been added to a route table which could indicate that new attack vectors have been opened up in the AWS account.

AWScloudtrail
TA0005 · Defense EvasionT1562.007 · Disable or Modify Cloud Firewall
jamesc-grafanaThu Jul 11cloud
Detectionmediumtest

New Network Route Added

Detects the addition of a new network route to a route table in AWS.

AWScloudtrail
TA0005 · Defense EvasionT1562.007 · Disable or Modify Cloud Firewall
jamesc-grafanaThu Jul 11cloud
Detectionmediumexperimental

PUA - AWS TruffleHog Execution

Detects the execution of TruffleHog, a popular open-source tool used for scanning repositories for secrets and sensitive information, within an AWS environment. It has been reported to be used by threat actors for credential harvesting. All detections should be investigated to determine if the usage is authorized by security teams or potentially malicious.

AWScloudtrail
TA0006 · Credential AccessT1555 · Credentials from Password StoresT1003 · OS Credential Dumping
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Oct 21cloud
Detectionmediumexperimental

AWS EnableRegion Command Monitoring

Detects the use of the EnableRegion command in AWS CloudTrail logs. While AWS has 30+ regions, some of them are enabled by default, others must be explicitly enabled in each account separately. There may be situations where security monitoring does not cover some new AWS regions. Monitoring the EnableRegion command is important for identifying potential persistence mechanisms employed by adversaries, as enabling additional regions can facilitate continued access and operations within an AWS environment.

AWScloudtrail
TA0003 · Persistence
Ivan Saakov+1Sun Oct 19cloud
Detectionmediumtest

Ingress/Egress Security Group Modification

Detects when an account makes changes to the ingress or egress rules of a security group. This can indicate that an attacker is attempting to open up new attack vectors in the account, that they are trying to exfiltrate data over the network, or that they are trying to allow machines in that VPC/Subnet to contact a C&C server.

AWScloudtrail
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
jamesc-grafanaThu Jul 11cloud
Detectionmediumtest

LoadBalancer Security Group Modification

Detects changes to the security groups associated with an Elastic Load Balancer (ELB) or Application Load Balancer (ALB). This can indicate that a misconfiguration allowing more traffic into the system than required, or could indicate that an attacker is attempting to enable new connections into a VPC or subnet controlled by the account.

AWScloudtrail
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
jamesc-grafanaThu Jul 11cloud
Detectionmediumtest

RDS Database Security Group Modification

Detects changes to the security group entries for RDS databases. This can indicate that a misconfiguration has occurred which potentially exposes the database to the public internet, a wider audience within the VPC or that removal of valid rules has occurred which could impact the availability of the database to legitimate services and users.

AWScloudtrail
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
jamesc-grafanaThu Jul 11cloud
Detectionhightest

Potential Malicious Usage of CloudTrail System Manager

Detect when System Manager successfully executes commands against an instance.

AWScloudtrail
TA0004 · Privilege EscalationTA0001 · Initial AccessT1566 · PhishingT1566.002 · Spearphishing Link
jamesc-grafanaThu Jul 11cloud
Detectionhighexperimental

AWS VPC Flow Logs Deleted

Detects the deletion of one or more VPC Flow Logs in AWS Elastic Compute Cloud (EC2) through the DeleteFlowLogs API call. Adversaries may delete flow logs to evade detection or remove evidence of network activity, hindering forensic investigations and visibility into malicious operations.

AWScloudtrail
TA0005 · Defense Evasion
Ivan SaakovSun Oct 19cloud
Detectionhightest

AWS Config Disabling Channel/Recorder

Detects AWS Config Service disabling

AWScloudtrail
TA0005 · Defense EvasionT1562.008 · Disable or Modify Cloud Logs
vitaliy0x1Tue Jan 21cloud
Detectionmediumtest

AWS Console GetSigninToken Potential Abuse

Detects potentially suspicious events involving "GetSigninToken". An adversary using the "aws_consoler" tool can leverage this console API to create temporary federated credential that help obfuscate which AWS credential is compromised (the original access key) and enables the adversary to pivot from the AWS CLI to console sessions without the need for MFA using the new access key issued in this request.

AWScloudtrail
TA0008 · Lateral MovementTA0005 · Defense EvasionT1021.007 · Cloud ServicesT1550.001 · Application Access Token
Chester Le BronMon Feb 26cloud
Detectionmediumtest

SES Identity Has Been Deleted

Detects an instance of an SES identity being deleted via the "DeleteIdentity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities

AWScloudtrail
TA0005 · Defense EvasionT1070 · Indicator Removal
Janantha MarasingheTue Dec 13cloud
Detectionmediumexperimental

AWS SAML Provider Deletion Activity

Detects the deletion of an AWS SAML provider, potentially indicating malicious intent to disrupt administrative or security team access. An attacker can remove the SAML provider for the information security team or a team of system administrators, to make it difficult for them to work and investigate at the time of the attack and after it.

AWScloudtrail
T1078.004 · Cloud AccountsTA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial Access+3
Ivan SaakovThu Dec 19cloud
Detectionmediumtest

AWS S3 Bucket Versioning Disable

Detects when S3 bucket versioning is disabled. Threat actors use this technique during AWS ransomware incidents prior to deleting S3 objects.

AWScloudtrail
TA0040 · ImpactT1490 · Inhibit System Recovery
Sean Johnstone | Unit 42Sat Oct 28cloud
Detectionmediumstable

AWS EC2 Disable EBS Encryption

Identifies disabling of default Amazon Elastic Block Store (EBS) encryption in the current region. Disabling default encryption does not change the encryption status of your existing volumes.

AWScloudtrail
TA0040 · ImpactT1486 · Data Encrypted for ImpactT1565 · Data Manipulation
Sittikorn STue Jun 29cloud
Detectionmediumexperimental

AWS Key Pair Import Activity

Detects the import of SSH key pairs into AWS EC2, which may indicate an attacker attempting to gain unauthorized access to instances. This activity could lead to initial access, persistence, or privilege escalation, potentially compromising sensitive data and operations.

AWScloudtrail
TA0001 · Initial AccessTA0005 · Defense EvasionT1078 · Valid AccountsTA0003 · Persistence+1
Ivan SaakovThu Dec 19cloud
Detectionhightest

AWS EC2 Startup Shell Script Change

Detects changes to the EC2 instance startup script. The shell script will be executed as root/SYSTEM every time the specific instances are booted up.

AWScloudtrail
TA0002 · ExecutionT1059.001 · PowerShellT1059.003 · Windows Command ShellT1059.004 · Unix Shell
falokerWed Feb 12cloud
Detectionlowtest

AWS EC2 VM Export Failure

An attempt to export an AWS EC2 instance has been detected. A VM Export might indicate an attempt to extract information from an instance.

AWScloudtrail
TA0009 · CollectionT1005 · Data from Local SystemTA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Diogo BrazThu Apr 16cloud
Detectionmediumtest

AWS ECS Task Definition That Queries The Credential Endpoint

Detects when an Elastic Container Service (ECS) Task Definition includes a command to query the credential endpoint. This can indicate a potential adversary adding a backdoor to establish persistence or escalate privileges.

AWScloudtrail
TA0003 · PersistenceT1525 · Implant Internal Image
Darin SmithTue Jun 07cloud
Detectionmediumtest

AWS EFS Fileshare Modified or Deleted

Detects when a EFS Fileshare is modified or deleted. You can't delete a file system that is in use. If the file system has any mount targets, the adversary must first delete them, so deletion of a mount will occur before deletion of a fileshare.

AWScloudtrail
TA0040 · Impact
Austin SongerSun Aug 15cloud
Detectionmediumtest

AWS EFS Fileshare Mount Modified or Deleted

Detects when a EFS Fileshare Mount is modified or deleted. An adversary breaking any file system using the mount target that is being deleted, which might disrupt instances or applications using those mounts.

AWScloudtrail
TA0040 · ImpactT1485 · Data Destruction
Austin SongerSun Aug 15cloud
Detectionlowtest

AWS EKS Cluster Created or Deleted

Identifies when an EKS cluster is created or deleted.

AWScloudtrail
TA0040 · ImpactT1485 · Data Destruction
Austin SongerMon Aug 16cloud
Detectionlowtest

AWS ElastiCache Security Group Created

Detects when an ElastiCache security group has been created.

AWScloudtrail
TA0003 · PersistenceT1136 · Create AccountT1136.003 · Cloud Account
Austin SongerSat Jul 24cloud
Detectionlowtest

AWS ElastiCache Security Group Modified or Deleted

Identifies when an ElastiCache security group has been modified or deleted.

AWScloudtrail
TA0040 · ImpactT1531 · Account Access Removal
Austin SongerSat Jul 24cloud
Detectionlowtest

Potential Bucket Enumeration on AWS

Looks for potential enumeration of AWS buckets via ListBuckets.

AWScloudtrail
TA0007 · DiscoveryT1580 · Cloud Infrastructure DiscoveryT1619 · Cloud Storage Object Discovery
Christopher Peacock+1Fri Jan 06cloud
Detectionhightest

AWS GuardDuty Important Change

Detects updates of the GuardDuty list of trusted IPs, perhaps to disable security alerts against malicious IPs.

AWScloudtrail
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
falokerTue Feb 11cloud
Detectionmediumtest

AWS IAM Backdoor Users Keys

Detects AWS API key creation for a user by another user. Backdoored users can be used to obtain persistence in the AWS environment. Also with this alert, you can detect a flow of AWS keys in your org.

AWScloudtrail
TA0003 · PersistenceTA0004 · Privilege EscalationT1098 · Account Manipulation
falokerWed Feb 12cloud
Detectionhightest

AWS IAM S3Browser LoginProfile Creation

Detects S3 Browser utility performing reconnaissance looking for existing IAM Users without a LoginProfile defined then (when found) creating a LoginProfile.

AWScloudtrail
TA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
daniel.bohannonWed May 17cloud
Detectionhightest

AWS IAM S3Browser Templated S3 Bucket Policy Creation

Detects S3 browser utility creating Inline IAM policy containing default S3 bucket name placeholder value of "<YOUR-BUCKET-NAME>".

AWScloudtrail
TA0002 · ExecutionT1059.009 · Cloud APITA0003 · PersistenceTA0005 · Defense Evasion+3
daniel.bohannonWed May 17cloud
Detectionhightest

AWS IAM S3Browser User or AccessKey Creation

Detects S3 Browser utility creating IAM User or AccessKey.

AWScloudtrail
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense Evasion+3
daniel.bohannonWed May 17cloud
Detectionhighexperimental

AWS KMS Imported Key Material Usage

Detects the import or deletion of key material in AWS KMS, which can be used as part of ransomware attacks. This activity is uncommon and provides a high certainty signal.

AWScloudtrail
TA0040 · ImpactT1486 · Data Encrypted for ImpactTA0042 · Resource DevelopmentT1608.003 · Install Digital Certificate
toopriceySat Oct 18cloud
Detectionmediumexperimental

New AWS Lambda Function URL Configuration Created

Detects when a user creates a Lambda function URL configuration, which could be used to expose the function to the internet and potentially allow unauthorized access to the function's IAM role for AWS API calls. This could give an adversary access to the privileges associated with the Lambda service role that is attached to that function.

AWScloudtrail
TA0001 · Initial AccessTA0004 · Privilege Escalation
Ivan SaakovThu Dec 19cloud
Detectionlowtest

AWS New Lambda Layer Attached

Detects when a user attached a Lambda layer to an existing Lambda function. A malicious Lambda layer could execute arbitrary code in the context of the function's IAM role. This would give an adversary access to resources that the function has access to.

AWScloudtrail
TA0004 · Privilege Escalation
Austin SongerThu Sep 23cloud
Detectionlowtest

AWS Glue Development Endpoint Activity

Detects possible suspicious glue development endpoint activity.

AWScloudtrail
TA0004 · Privilege Escalation
Austin SongerSun Oct 03cloud
Detectionmediumtest

AWS RDS Master Password Change

Detects the change of database master password. It may be a part of data exfiltration.

AWScloudtrail
TA0010 · ExfiltrationT1020 · Automated Exfiltration
falokerWed Feb 12cloud
Detectionhighexperimental

Modification or Deletion of an AWS RDS Cluster

Detects modifications to an RDS cluster or its deletion, which may indicate potential data exfiltration attempts, unauthorized access, or exposure of sensitive information.

AWScloudtrail
TA0010 · ExfiltrationT1020 · Automated Exfiltration
Ivan SaakovFri Dec 06cloud
Detectionhightest

Restore Public AWS RDS Instance

Detects the recovery of a new public database instance from a snapshot. It may be a part of data exfiltration.

AWScloudtrail
TA0010 · ExfiltrationT1020 · Automated Exfiltration
falokerWed Feb 12cloud
Detectionmediumtest

AWS Root Credentials

Detects AWS root account usage

AWScloudtrail
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · Persistence+1
vitaliy0x1Tue Jan 21cloud
Detectionlowtest

AWS Route 53 Domain Transfer Lock Disabled

Detects when a transfer lock was removed from a Route 53 domain. It is recommended to refrain from performing this action unless intending to transfer the domain to a different registrar.

AWScloudtrail
TA0003 · PersistenceTA0004 · Privilege EscalationTA0006 · Credential AccessT1098 · Account Manipulation
Elastic Security+1Thu Jul 22cloud
Detectionlowtest

AWS Route 53 Domain Transferred to Another Account

Detects when a request has been made to transfer a Route 53 domain to another AWS account.

AWScloudtrail
TA0003 · PersistenceTA0006 · Credential AccessTA0004 · Privilege EscalationT1098 · Account Manipulation
Elastic Security+1Thu Jul 22cloud
Detectionlowtest

AWS S3 Data Management Tampering

Detects when a user tampers with S3 data management in Amazon Web Services.

AWScloudtrail
TA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Austin SongerSat Jul 24cloud
Detectionhighstable

AWS SecurityHub Findings Evasion

Detects the modification of the findings on SecurityHub.

AWScloudtrail
TA0005 · Defense EvasionT1562 · Impair Defenses
Sittikorn SMon Jun 28cloud