-
Notifications
You must be signed in to change notification settings - Fork 11
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
New events: New Developments in LLM Hijacking Activity (#24)
* update events and add new events from wiz incident report * fix log examples
- Loading branch information
1 parent
c20d714
commit ed92f93
Showing
15 changed files
with
1,136 additions
and
795 deletions.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
[ | ||
{ | ||
"awsRegion": "euiso-westwest-1r", | ||
"errorCode": "AccessDenied", | ||
"errorMessage": "User: arn:aws:sts::186599486980:assumed-role/AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851aa11/TrailDiscover is not authorized to perform: iam:CreatePolicy on resource: policy TrailDiscoverPolicy because no identity-based policy allows the iam:CreatePolicy action", | ||
"eventCategory": "Management", | ||
"eventID": "5de97e56-a296-4e79-9122-e8543a2cb73e", | ||
"eventName": "CreatePolicy", | ||
"eventSource": "iam.amazonaws.com", | ||
"eventTime": "2024-12-15T20:02:24Z", | ||
"eventType": "AwsApiCall", | ||
"eventVersion": "1.10", | ||
"managementEvent": true, | ||
"readOnly": false, | ||
"recipientAccountId": "186599486980", | ||
"requestID": "2639d1f3-1b9d-44d0-8117-d96c2f03411b", | ||
"requestParameters": null, | ||
"responseElements": null, | ||
"sourceIPAddress": "253.236.07.202", | ||
"tlsDetails": { | ||
"cipherSuite": "TLS_AES_128_GCM_SHA256", | ||
"clientProvidedHostHeader": "iam.amazonaws.com", | ||
"tlsVersion": "TLSv1.3" | ||
}, | ||
"userAgent": "aws-cli/2.17.32 md/awscrt#0.21.2 ua/2.0 os/linux#100.17.9.229-microsoft-standard-WSL2 md/arch#x86_64 lang/python#3.11.9 md/pyimpl#CPython exec-env/grimoire_26bb1fec-10f7-4d6b-b066-0111a84c7bff cfg/retry-mode#standard md/installer#exe md/distrib#ubuntu.24 md/prompt#off md/command#iam.create-policy", | ||
"userIdentity": { | ||
"accessKeyId": "ASIA48E5EUGOF4RDUZSA", | ||
"accountId": "186599486980", | ||
"arn": "arn:aws:sts::186599486980:assumed-role/AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851aa11/TrailDiscover", | ||
"principalId": "AROAC40R4TTV05DWF5L1H:TrailDiscover", | ||
"sessionContext": { | ||
"attributes": { | ||
"creationDate": "2024-12-15T20:02:14Z", | ||
"mfaAuthenticated": "false" | ||
}, | ||
"sessionIssuer": { | ||
"accountId": "186599486980", | ||
"arn": "arn:aws:iam::186599486980:role/aws-reserved/sso.amazonaws.com/us-westsouth-3r/AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851aa11", | ||
"principalId": "AROAC40R4TTV05DWF5L1H", | ||
"type": "Role", | ||
"userName": "AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851aa11" | ||
} | ||
}, | ||
"type": "AssumedRole" | ||
} | ||
} | ||
] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
[ | ||
{ | ||
"eventVersion": "1.08", | ||
"userIdentity": { | ||
"type": "AssumedRole", | ||
"principalId": "AROA3H1YZ9UJ1EFEEVH1U:TrailDiscover", | ||
"arn": "arn:aws:sts::393031354412:assumed-role/AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851aa33/TrailDiscover", | ||
"accountId": "393031354412", | ||
"accessKeyId": "ASIAPXEBOKNPAVQ9BFGQ", | ||
"sessionContext": { | ||
"sessionIssuer": { | ||
"type": "Role", | ||
"principalId": "AROA3H1YZ9UJ1EFEEVH1U", | ||
"arn": "arn:aws:iam::393031354412:role/aws-reserved/sso.amazonaws.com/apiso-south-2r/AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851aa33", | ||
"accountId": "393031354412", | ||
"userName": "AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851aa33" | ||
}, | ||
"attributes": { | ||
"creationDate": "2024-12-15T18:41:25Z", | ||
"mfaAuthenticated": "false" | ||
} | ||
} | ||
}, | ||
"eventTime": "2024-12-15T18:54:36Z", | ||
"eventSource": "ses.amazonaws.com", | ||
"eventName": "ListEmailIdentities", | ||
"awsRegion": "ca-centraleast-3r", | ||
"sourceIPAddress": "8.214.221.11", | ||
"userAgent": "aws-cli/2.17.32 md/awscrt#0.21.2 ua/2.0 os/linux#55.206.255.019-microsoft-standard-WSL2 md/arch#x86_64 lang/python#3.11.9 md/pyimpl#CPython exec-env/grimoire_0edfa7de-9f3f-4506-8040-a8ae6c4ac866 cfg/retry-mode#standard md/installer#exe md/distrib#ubuntu.24 md/prompt#off md/command#sesv2.list-email-identities", | ||
"requestParameters": null, | ||
"responseElements": null, | ||
"requestID": "2115c9c6-8d8b-4ea5-a982-eedb477fb52a", | ||
"eventID": "007ebdb7-8af1-42c7-a257-2fac3e475d6c", | ||
"readOnly": true, | ||
"eventType": "AwsApiCall", | ||
"managementEvent": true, | ||
"recipientAccountId": "393031354412", | ||
"eventCategory": "Management", | ||
"tlsDetails": { | ||
"tlsVersion": "TLSv1.3", | ||
"cipherSuite": "TLS_AES_128_GCM_SHA256", | ||
"clientProvidedHostHeader": "email.ca-centraleast-3r.amazonaws.com" | ||
} | ||
} | ||
] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
{ | ||
"eventName": "CreatePolicy", | ||
"eventSource": "iam.amazonaws.com", | ||
"awsService": "IAM", | ||
"description": "Creates a new managed policy for your AWS account.", | ||
"mitreAttackTactics": [ | ||
"TA0004 - Privilege Escalation" | ||
], | ||
"mitreAttackTechniques": [ | ||
"T1098 - Account Manipulation" | ||
], | ||
"mitreAttackSubTechniques": [ | ||
"T1098.003 - Account Manipulation: Additional Cloud Roles" | ||
], | ||
"unverifiedMitreAttackTechniques": [], | ||
"usedInWild": true, | ||
"incidents": [ | ||
{ | ||
"description": "New Developments in LLM Hijacking Activity", | ||
"link": "https://www.wiz.io/blog/jinx-2401-llm-hijacking-aws" | ||
} | ||
], | ||
"researchLinks": [], | ||
"securityImplications": "Attackers might use CreatePolicy to create new IAM policies that later they can use for potentially granting themselves elevated permissions.", | ||
"alerting": [ | ||
{ | ||
"type": "cloudwatchCISControls", | ||
"value": "https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html#cloudwatch-4" | ||
} | ||
], | ||
"simulation": [ | ||
{ | ||
"type": "commandLine", | ||
"value": "aws iam create-policy --policy-name TrailDiscoverPolicy --policy-document {}" | ||
} | ||
], | ||
"permissions": "https://aws.permissions.cloud/iam/iam#iam-CreatePolicy" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
[ | ||
{ | ||
"awsRegion": "euiso-westwest-1r", | ||
"errorCode": "AccessDenied", | ||
"errorMessage": "User: arn:aws:sts::186599486980:assumed-role/AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851aa11/TrailDiscover is not authorized to perform: iam:CreatePolicy on resource: policy TrailDiscoverPolicy because no identity-based policy allows the iam:CreatePolicy action", | ||
"eventCategory": "Management", | ||
"eventID": "5de97e56-a296-4e79-9122-e8543a2cb73e", | ||
"eventName": "CreatePolicy", | ||
"eventSource": "iam.amazonaws.com", | ||
"eventTime": "2024-12-15T20:02:24Z", | ||
"eventType": "AwsApiCall", | ||
"eventVersion": "1.10", | ||
"managementEvent": true, | ||
"readOnly": false, | ||
"recipientAccountId": "186599486980", | ||
"requestID": "2639d1f3-1b9d-44d0-8117-d96c2f03411b", | ||
"requestParameters": null, | ||
"responseElements": null, | ||
"sourceIPAddress": "253.236.07.202", | ||
"tlsDetails": { | ||
"cipherSuite": "TLS_AES_128_GCM_SHA256", | ||
"clientProvidedHostHeader": "iam.amazonaws.com", | ||
"tlsVersion": "TLSv1.3" | ||
}, | ||
"userAgent": "aws-cli/2.17.32 md/awscrt#0.21.2 ua/2.0 os/linux#100.17.9.229-microsoft-standard-WSL2 md/arch#x86_64 lang/python#3.11.9 md/pyimpl#CPython exec-env/grimoire_26bb1fec-10f7-4d6b-b066-0111a84c7bff cfg/retry-mode#standard md/installer#exe md/distrib#ubuntu.24 md/prompt#off md/command#iam.create-policy", | ||
"userIdentity": { | ||
"accessKeyId": "ASIA48E5EUGOF4RDUZSA", | ||
"accountId": "186599486980", | ||
"arn": "arn:aws:sts::186599486980:assumed-role/AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851aa11/TrailDiscover", | ||
"principalId": "AROAC40R4TTV05DWF5L1H:TrailDiscover", | ||
"sessionContext": { | ||
"attributes": { | ||
"creationDate": "2024-12-15T20:02:14Z", | ||
"mfaAuthenticated": "false" | ||
}, | ||
"sessionIssuer": { | ||
"accountId": "186599486980", | ||
"arn": "arn:aws:iam::186599486980:role/aws-reserved/sso.amazonaws.com/us-westsouth-3r/AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851aa11", | ||
"principalId": "AROAC40R4TTV05DWF5L1H", | ||
"type": "Role", | ||
"userName": "AWSReservedSSO_ReadOnlyAccess_ff7f8c5c5851aa11" | ||
} | ||
}, | ||
"type": "AssumedRole" | ||
} | ||
} | ||
] |
Oops, something went wrong.