AWS Threat Hunting Ideas: EC2
Overview:
1. Unauthorized Instance Launch (RunInstances)
bashCopy codeaws cloudtrail lookup-events --lookup-attributes AttributeKey=EventName,AttributeValue=RunInstances
2. Security Group Changes (AuthorizeSecurityGroupIngress/RevokeSecurityGroupIngress)
aws cloudtrail lookup-events --lookup-attributes AttributeKey=EventName,AttributeValue=AuthorizeSecurityGroupIngress
3. Stopping or Terminating EC2 Instances (StopInstances/TerminateInstances)
4. Modifying IAM Role Attached to EC2 (AssociateIamInstanceProfile)
5. Metadata Exploitation Detection (GetInstanceMetadata/DescribeInstances)
6. Disabling Security Monitoring (DisableAlarmActions)
7. Snapshot Creation and Copying (CreateSnapshot/CopySnapshot)
8. Changes to Key Pairs (ImportKeyPair/DeleteKeyPair)
9. Root or Privileged API Calls (AssumeRole/AssumeRoleWithSAML)
10. Unusual API Usage (DescribeSecurityGroups/DescribeInstances)
Last updated