Skip to main content

AWS Console GetSigninToken Event

Overview

This detector identifies suspicious "GetSigninToken" events in the AWS Console. It alerts when an attacker potentially uses tools like "aws_consoler" to create temporary federated credentials, bypassing the need for MFA. These credentials can be used to pivot from the AWS CLI to the console without the original access key, making it harder to identify the compromised credential. Investigating these events helps detect and respond to unauthorized access attempts and potential credential abuse.

Vendor

AWS

Input

{
"expectedUserAgents": {
"label": "Expected User Agents",
"helpText": "List of expected user agents for GetSigninToken events. GetSigninToken events will occur when using AWS SSO portal to login and will generate false positives if you do not filter for the expected user agent(s).",
"type": "string[]",
"value": []
}
}

References

https://github.com/NetSPI/aws_consoler, https://www.crowdstrike.com/blog/analysis-of-intrusion-campaign-targeting-telecom-and-bpo-companies/

Severity

3