Cloud Compute Instance Created By Previously Unseen User

Original Source: [splunk source]
Name:Cloud Compute Instance Created By Previously Unseen User
id:37a0ec8d-827e-4d6d-8025-cedf31f3a149
version:4
date:2024-10-17
author:Rico Valdez, Splunk
status:experimental
type:Anomaly
Description:The following analytic identifies the creation of cloud compute instances by users who have not previously created them. It leverages data from the Change data model, focusing on 'create' actions by users, and cross-references with a baseline of known user activities. This activity is significant as it may indicate unauthorized access or misuse of cloud resources by new or compromised accounts. If confirmed malicious, attackers could deploy unauthorized compute instances, leading to potential data exfiltration, increased costs, or further exploitation within the cloud environment.
Data_source:
  • -AWS CloudTrail
search:| tstats `security_content_summariesonly` count earliest(_time) as firstTime, latest(_time) as lastTime values(All_Changes.object) as dest from datamodel=Change where All_Changes.action=created by All_Changes.user All_Changes.vendor_region
| `drop_dm_object_name("All_Changes")`
| lookup previously_seen_cloud_compute_creations_by_user user as user OUTPUTNEW firstTimeSeen, enough_data
| eventstats max(enough_data) as enough_data
| where enough_data=1
| eval firstTimeSeenUser=min(firstTimeSeen)
| where isnull(firstTimeSeenUser) OR firstTimeSeenUser > relative_time(now(), "-24h@h")
| table firstTime, user, dest, count vendor_region
| `security_content_ctime(firstTime)`
| `cloud_compute_instance_created_by_previously_unseen_user_filter`


how_to_implement:You must be ingesting the appropriate cloud-infrastructure logs Run the "Previously Seen Cloud Compute Creations By User" support search to create of baseline of previously seen users.
known_false_positives:It's possible that a user will start to create compute instances for the first time, for any number of reasons. Verify with the user launching instances that this is the intended behavior.
References:
drilldown_searches:
  :
tags:
  analytic_story:
    - 'Cloud Cryptomining'
  asset_type:Cloud Compute Instance
  confidence:60
  impact:30
  message:User $user$ is creating a new instance $dest$ for the first time
  mitre_attack_id:
    - 'T1078.004'
    - 'T1078'
  observable:
    name:'user'
    type:'User'
    - role:
      - 'Attacker'
    name:'dest'
    type:'Endpoint'
    - role:
      - 'Victim'
  product:
    - 'Splunk Enterprise'
    - 'Splunk Enterprise Security'
    - 'Splunk Cloud'
  required_fields:
    - '_time'
    - 'All_Changes.object'
    - 'All_Changes.action'
    - 'All_Changes.user'
    - 'All_Changes.vendor_region'
  risk_score:18
  security_domain:threat

tests:
name:'True Positive Test'
 attack_data:
  data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/suspicious_behaviour/abnormally_high_cloud_instances_launched/cloudtrail_behavioural_detections.json
  sourcetype: aws:cloudtrail
  source: aws_cloudtrail
  update_timestamp: True
manual_test:None

Related Analytic Stories


Cloud Cryptomining