Tales from the Cloud Trenches: The Attacker Doth Persist Too Much

Datadog Security Labs investigated a cloud intrusion where attackers exploited a leaked long-term AWS access key to execute both common and novel persistence techniques. Notably, they established a "persistence-as-a-service" mechanism by deploying a Lambda function triggered via an API Gateway, enabling the dynamic creation of IAM users even after the original credentials were revoked. Additionally, the attackers leveraged Telegram infrastructure, with ConsoleLogin events originating from Telegram IP addresses, suggesting the use of bots to automate AWS console access. They also disabled trusted access for multiple AWS organization-level services and manipulated AWS Identity Center configurations to maintain access. These tactics underscore the evolving sophistication of cloud-based threats and the importance of vigilant monitoring and proactive security measures. 

https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-the-attacker-doth-persist-too-much

Comments

Popular posts from this blog

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities

OWASP SAMM Skills Framework Enhances Software Security Roles