Skip to content

Commit

Permalink
New events: Datadog threat roundup: top insights for Q4 2024 (#27)
Browse files Browse the repository at this point in the history
* update events and add new events from pepperclipp blog post

* update events and add new events from datadog 2024-q4-threat-roundup
  • Loading branch information
adanalvarez authored Feb 15, 2025
1 parent e575af3 commit 6b702dc
Show file tree
Hide file tree
Showing 19 changed files with 1,859 additions and 1,063 deletions.
2,472 changes: 1,419 additions & 1,053 deletions docs/datadog_dashboard.json

Large diffs are not rendered by default.

22 changes: 12 additions & 10 deletions docs/events.csv

Large diffs are not rendered by default.

116 changes: 116 additions & 0 deletions docs/events.json
Original file line number Diff line number Diff line change
Expand Up @@ -3706,6 +3706,37 @@
],
"permissions": "https://aws.permissions.cloud/iam/iam#iam-DetachRolePolicy"
},
{
"eventName": "ListUserPolicies",
"eventSource": "iam.amazonaws.com",
"awsService": "IAM",
"description": "Lists the names of the inline policies embedded in the specified IAM user.",
"mitreAttackTactics": [
"TA0007 - Discovery"
],
"mitreAttackTechniques": [
"T1087 - Account Discovery"
],
"mitreAttackSubTechniques": [],
"unverifiedMitreAttackTechniques": [],
"usedInWild": true,
"incidents": [
{
"description": "Datadog threat roundup: top insights for Q4 2024",
"link": "https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/"
}
],
"researchLinks": [],
"securityImplications": "Attackers might use ListUserPolicies to identify permissions associated with various users in AWS.",
"alerting": [],
"simulation": [
{
"type": "commandLine",
"value": "aws iam list-user-policies --user-name TrailDiscover"
}
],
"permissions": "https://aws.permissions.cloud/iam/iam#iam-ListUserPolicies"
},
{
"eventName": "UpdateLoginProfile",
"eventSource": "iam.amazonaws.com",
Expand Down Expand Up @@ -4077,6 +4108,10 @@
{
"description": "Leaked Environment Variables Allow Large-Scale Extortion Operation in Cloud Environments",
"link": "https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/"
},
{
"description": "Datadog threat roundup: top insights for Q4 2024",
"link": "https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/"
}
],
"researchLinks": [
Expand Down Expand Up @@ -4350,6 +4385,39 @@
],
"permissions": "https://aws.permissions.cloud/iam/iam#iam-DeleteUserPolicy"
},
{
"eventName": "ListAttachedUserPolicies",
"eventSource": "iam.amazonaws.com",
"awsService": "IAM",
"description": "Lists all managed policies that are attached to the specified IAM user.",
"mitreAttackTactics": [
"TA0007 - Discovery"
],
"mitreAttackTechniques": [
"T1087 - Account Discovery"
],
"mitreAttackSubTechniques": [
"T1087.004 - Account Discovery: Cloud Account"
],
"unverifiedMitreAttackTechniques": [],
"usedInWild": true,
"incidents": [
{
"description": "Datadog threat roundup: top insights for Q4 2024",
"link": "https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/"
}
],
"researchLinks": [],
"securityImplications": "Attackers might use ListAttachedUserPolicies to identify and exploit permissions associated with various users in AWS.",
"alerting": [],
"simulation": [
{
"type": "commandLine",
"value": "aws iam list-attached-user-policies --user-name TrailDiscover"
}
],
"permissions": "https://aws.permissions.cloud/iam/iam#iam-ListAttachedUserPolicies"
},
{
"eventName": "ListRoles",
"eventSource": "iam.amazonaws.com",
Expand Down Expand Up @@ -4689,6 +4757,10 @@
{
"description": "Tales from the cloud trenches: Raiding for AWS vaults, buckets and secrets",
"link": "https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-raiding-for-vaults-buckets-secrets/"
},
{
"description": "Datadog threat roundup: top insights for Q4 2024",
"link": "https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/"
}
],
"researchLinks": [],
Expand Down Expand Up @@ -5265,6 +5337,10 @@
{
"description": "Compromised Cloud Compute Credentials: Case Studies From the Wild",
"link": "https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/#post-125981-_kdq0vw6banab"
},
{
"description": "Datadog threat roundup: top insights for Q4 2024",
"link": "https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/"
}
],
"researchLinks": [],
Expand Down Expand Up @@ -9248,6 +9324,10 @@
{
"description": "New Developments in LLM Hijacking Activity",
"link": "https://www.wiz.io/blog/jinx-2401-llm-hijacking-aws"
},
{
"description": "Datadog threat roundup: top insights for Q4 2024",
"link": "https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/"
}
],
"researchLinks": [],
Expand All @@ -9257,6 +9337,10 @@
{
"type": "commandLine",
"value": "N/A"
},
{
"type": "stratusRedTeam",
"value": "https://stratus-red-team.cloud/attack-techniques/AWS/aws.impact.bedrock-invoke-model"
}
],
"permissions": "https://aws.permissions.cloud/iam/bedrock#bedrock-InvokeModel"
Expand Down Expand Up @@ -9417,6 +9501,10 @@
{
"type": "commandLine",
"value": "N/A"
},
{
"type": "stratusRedTeam",
"value": "https://stratus-red-team.cloud/attack-techniques/AWS/aws.impact.bedrock-invoke-model"
}
],
"permissions": "https://aws.permissions.cloud/iam/bedrock#bedrock-PutFoundationModelEntitlement"
Expand Down Expand Up @@ -9516,6 +9604,10 @@
{
"description": "New Developments in LLM Hijacking Activity",
"link": "https://www.wiz.io/blog/jinx-2401-llm-hijacking-aws"
},
{
"description": "Datadog threat roundup: top insights for Q4 2024",
"link": "https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/"
}
],
"researchLinks": [],
Expand All @@ -9525,6 +9617,10 @@
{
"type": "commandLine",
"value": "N/A"
},
{
"type": "stratusRedTeam",
"value": "https://stratus-red-team.cloud/attack-techniques/AWS/aws.impact.bedrock-invoke-model"
}
],
"permissions": "https://aws.permissions.cloud/iam/bedrock#bedrock-PutUseCaseForModelAccess"
Expand Down Expand Up @@ -9560,6 +9656,10 @@
{
"description": "When AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplaying",
"link": "https://permiso.io/blog/exploiting-hosted-models"
},
{
"description": "Datadog threat roundup: top insights for Q4 2024",
"link": "https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/"
}
],
"researchLinks": [],
Expand All @@ -9569,6 +9669,10 @@
{
"type": "commandLine",
"value": "N/A"
},
{
"type": "stratusRedTeam",
"value": "https://stratus-red-team.cloud/attack-techniques/AWS/aws.impact.bedrock-invoke-model"
}
],
"permissions": "https://aws.permissions.cloud/iam/bedrock#bedrock-GetFoundationModelAvailability"
Expand Down Expand Up @@ -9612,6 +9716,10 @@
{
"description": "Detecting AI resource-hijacking with Composite Alerts",
"link": "https://www.lacework.com/blog/detecting-ai-resource-hijacking-with-composite-alerts"
},
{
"description": "Datadog threat roundup: top insights for Q4 2024",
"link": "https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/"
}
],
"researchLinks": [],
Expand Down Expand Up @@ -9665,6 +9773,10 @@
{
"type": "commandLine",
"value": "N/A"
},
{
"type": "stratusRedTeam",
"value": "https://stratus-red-team.cloud/attack-techniques/AWS/aws.impact.bedrock-invoke-model"
}
],
"permissions": "https://aws.permissions.cloud/iam/bedrock#bedrock-ListFoundationModelAgreementOffers"
Expand Down Expand Up @@ -9769,6 +9881,10 @@
{
"type": "commandLine",
"value": "N/A"
},
{
"type": "stratusRedTeam",
"value": "https://stratus-red-team.cloud/attack-techniques/AWS/aws.impact.bedrock-invoke-model"
}
],
"permissions": "https://aws.permissions.cloud/iam/bedrock#bedrock-CreateFoundationModelAgreement"
Expand Down
49 changes: 49 additions & 0 deletions docs/logExamples/ListAttachedUserPolicies.json.cloudtrail
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
[
{
"awsRegion": "us-east-1",
"errorCode": "NoSuchEntityException",
"errorMessage": "The user with name TrailDiscover cannot be found.",
"eventCategory": "Management",
"eventID": "9a396e10-d67f-4f05-9f32-859ae5cade36",
"eventName": "ListAttachedUserPolicies",
"eventSource": "iam.amazonaws.com",
"eventTime": "2025-02-15T15:40:57Z",
"eventType": "AwsApiCall",
"eventVersion": "1.10",
"managementEvent": true,
"readOnly": true,
"recipientAccountId": "345594607949",
"requestID": "20de2ce1-33ee-4bb4-943b-2ff84ecfda78",
"requestParameters": {
"userName": "TrailDiscover"
},
"responseElements": null,
"sourceIPAddress": "46.6.38.8",
"tlsDetails": {
"cipherSuite": "TLS_AES_128_GCM_SHA256",
"clientProvidedHostHeader": "iam.amazonaws.com",
"tlsVersion": "TLSv1.3"
},
"userAgent": "aws-cli/2.17.32 md/awscrt#0.21.2 ua/2.0 os/linux#5.15.153.1-microsoft-standard-WSL2 md/arch#x86_64 lang/python#3.11.9 md/pyimpl#CPython exec-env/grimoire_2801d487-3878-4c1f-983f-84915804c148 cfg/retry-mode#standard md/installer#exe md/distrib#ubuntu.24 md/prompt#off md/command#iam.list-attached-user-policies",
"userIdentity": {
"accessKeyId": "ASIAVA5YLHFG22UNOASA",
"accountId": "345594607949",
"arn": "arn:aws:sts::345594607949:assumed-role/AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851db50/AdanAlvarez",
"principalId": "AROAVA5YLHFGXTTEWKGQX:AdanAlvarez",
"sessionContext": {
"attributes": {
"creationDate": "2025-02-15T14:50:08Z",
"mfaAuthenticated": "false"
},
"sessionIssuer": {
"accountId": "345594607949",
"arn": "arn:aws:iam::345594607949:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851db50",
"principalId": "AROAVA5YLHFGXTTEWKGQX",
"type": "Role",
"userName": "AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851db50"
}
},
"type": "AssumedRole"
}
}
]
49 changes: 49 additions & 0 deletions docs/logExamples/ListUserPolicies.json.cloudtrail
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
[
{
"awsRegion": "us-east-1",
"errorCode": "NoSuchEntityException",
"errorMessage": "The user with name TrailDiscover cannot be found.",
"eventCategory": "Management",
"eventID": "0da25550-3bef-4363-b108-ce251458810b",
"eventName": "ListUserPolicies",
"eventSource": "iam.amazonaws.com",
"eventTime": "2025-02-15T15:43:34Z",
"eventType": "AwsApiCall",
"eventVersion": "1.10",
"managementEvent": true,
"readOnly": true,
"recipientAccountId": "345594607949",
"requestID": "defb94d0-1b25-4aff-a0c7-4a504d404c51",
"requestParameters": {
"userName": "TrailDiscover"
},
"responseElements": null,
"sourceIPAddress": "46.6.38.8",
"tlsDetails": {
"cipherSuite": "TLS_AES_128_GCM_SHA256",
"clientProvidedHostHeader": "iam.amazonaws.com",
"tlsVersion": "TLSv1.3"
},
"userAgent": "aws-cli/2.17.32 md/awscrt#0.21.2 ua/2.0 os/linux#5.15.153.1-microsoft-standard-WSL2 md/arch#x86_64 lang/python#3.11.9 md/pyimpl#CPython exec-env/grimoire_6d40e0be-ce78-4b14-9c52-518635abb5cb cfg/retry-mode#standard md/installer#exe md/distrib#ubuntu.24 md/prompt#off md/command#iam.list-user-policies",
"userIdentity": {
"accessKeyId": "ASIAVA5YLHFG22UNOASA",
"accountId": "345594607949",
"arn": "arn:aws:sts::345594607949:assumed-role/AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851db50/AdanAlvarez",
"principalId": "AROAVA5YLHFGXTTEWKGQX:AdanAlvarez",
"sessionContext": {
"attributes": {
"creationDate": "2025-02-15T14:50:08Z",
"mfaAuthenticated": "false"
},
"sessionIssuer": {
"accountId": "345594607949",
"arn": "arn:aws:iam::345594607949:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851db50",
"principalId": "AROAVA5YLHFGXTTEWKGQX",
"type": "Role",
"userName": "AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851db50"
}
},
"type": "AssumedRole"
}
}
]
4 changes: 4 additions & 0 deletions events/Bedrock/CreateFoundationModelAgreement.json
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,10 @@
{
"type": "commandLine",
"value": "N/A"
},
{
"type": "stratusRedTeam",
"value": "https://stratus-red-team.cloud/attack-techniques/AWS/aws.impact.bedrock-invoke-model"
}
],
"permissions": "https://aws.permissions.cloud/iam/bedrock#bedrock-CreateFoundationModelAgreement"
Expand Down
8 changes: 8 additions & 0 deletions events/Bedrock/GetFoundationModelAvailability.json
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,10 @@
{
"description": "When AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplaying",
"link": "https://permiso.io/blog/exploiting-hosted-models"
},
{
"description": "Datadog threat roundup: top insights for Q4 2024",
"link": "https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/"
}
],
"researchLinks": [],
Expand All @@ -38,6 +42,10 @@
{
"type": "commandLine",
"value": "N/A"
},
{
"type": "stratusRedTeam",
"value": "https://stratus-red-team.cloud/attack-techniques/AWS/aws.impact.bedrock-invoke-model"
}
],
"permissions": "https://aws.permissions.cloud/iam/bedrock#bedrock-GetFoundationModelAvailability"
Expand Down
8 changes: 8 additions & 0 deletions events/Bedrock/InvokeModel.json
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,10 @@
{
"description": "New Developments in LLM Hijacking Activity",
"link": "https://www.wiz.io/blog/jinx-2401-llm-hijacking-aws"
},
{
"description": "Datadog threat roundup: top insights for Q4 2024",
"link": "https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/"
}
],
"researchLinks": [],
Expand All @@ -56,6 +60,10 @@
{
"type": "commandLine",
"value": "N/A"
},
{
"type": "stratusRedTeam",
"value": "https://stratus-red-team.cloud/attack-techniques/AWS/aws.impact.bedrock-invoke-model"
}
],
"permissions": "https://aws.permissions.cloud/iam/bedrock#bedrock-InvokeModel"
Expand Down
4 changes: 4 additions & 0 deletions events/Bedrock/ListFoundationModelAgreementOffers.json
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,10 @@
{
"type": "commandLine",
"value": "N/A"
},
{
"type": "stratusRedTeam",
"value": "https://stratus-red-team.cloud/attack-techniques/AWS/aws.impact.bedrock-invoke-model"
}
],
"permissions": "https://aws.permissions.cloud/iam/bedrock#bedrock-ListFoundationModelAgreementOffers"
Expand Down
4 changes: 4 additions & 0 deletions events/Bedrock/ListFoundationModels.json
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,10 @@
{
"description": "Detecting AI resource-hijacking with Composite Alerts",
"link": "https://www.lacework.com/blog/detecting-ai-resource-hijacking-with-composite-alerts"
},
{
"description": "Datadog threat roundup: top insights for Q4 2024",
"link": "https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/"
}
],
"researchLinks": [],
Expand Down
Loading

0 comments on commit 6b702dc

Please sign in to comment.