Skip to main content

UnauthorizedAccess Followed By Create User

Overview

This detector reports an issue when an IAM user that has an UnauthorizedAccess finding in AWS Security Hub creates a new IAM user.

If an attacker compromises an existing IAM user, they might create additional users as a next step to establish persistence in your AWS account. This detector is intended to identify this pattern.

Technical details:

  • UnauthorizedAccess findings in Security Hub are generated by Amazon GuardDuty based on GuardDuty's analysis of events from CloudTrail
    • Multiple successful console logins from different geographic locations around the same time
    • Use of temporary credentials for an EC2 instance from external IP addresses
    • API calls from known malicious IP addresses
    • API calls from exit nodes of the Tor, anonymous routing network
    • Other patterns that may be detected by GuardDuty (including Machine Learning analysis of CloudTrail events)
  • The creation of a new IAM user is identified by detecting CreateUser events from CloudTrail.

This detector monitors AWS Security Hub for UnauthorizedAccess findings related to an IAM user, followed by CreateUser.

Vendor

AWS

Severity

4