Skip to content

Commit 6ac6153

Browse files
Merge PR #4836 from @jamesc-grafana - Update AWS Rule to use fieldref modifier instead of contains
update: AWS User Login Profile Was Modified - use fieldref instead of contains modifier --------- Co-authored-by: nasbench <[email protected]>
1 parent 481337a commit 6ac6153

File tree

1 file changed

+10
-15
lines changed

1 file changed

+10
-15
lines changed

rules/cloud/aws/cloudtrail/aws_update_login_profile.yml

Lines changed: 10 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -2,31 +2,26 @@ title: AWS User Login Profile Was Modified
22
id: 055fb148-60f8-462d-ad16-26926ce050f1
33
status: test
44
description: |
5-
An attacker with the iam:UpdateLoginProfile permission on other users can change the password used to login to the AWS console on any user that already has a login profile setup.
6-
With this alert, it is used to detect anyone is changing password on behalf of other users.
5+
Detects activity when someone is changing passwords on behalf of other users.
6+
An attacker with the "iam:UpdateLoginProfile" permission on other users can change the password used to login to the AWS console on any user that already has a login profile setup.
77
references:
88
- https://github.com/RhinoSecurityLabs/AWS-IAM-Privilege-Escalation
99
author: toffeebr33k
1010
date: 2021/08/09
11-
modified: 2022/10/09
11+
modified: 2024/04/26
1212
tags:
1313
- attack.persistence
1414
- attack.t1098
1515
logsource:
1616
product: aws
1717
service: cloudtrail
1818
detection:
19-
selection_source:
20-
eventSource: iam.amazonaws.com
21-
eventName: UpdateLoginProfile
22-
filter:
23-
userIdentity.arn|contains: requestParameters.userName
24-
condition: selection_source and not filter
25-
fields:
26-
- userIdentity.arn
27-
- requestParameters.userName
28-
- errorCode
29-
- errorMessage
19+
selection:
20+
eventSource: 'iam.amazonaws.com'
21+
eventName: 'UpdateLoginProfile'
22+
filter_main_user_identity:
23+
userIdentity.arn|fieldref: requestParameters.userName
24+
condition: selection and not 1 of filter_main_*
3025
falsepositives:
31-
- Legit User Account Administration
26+
- Legitimate user account administration
3227
level: high

0 commit comments

Comments
 (0)