Skip to content

Commit d2d3091

Browse files
authored
Add references to docs (#493)
1 parent d519da9 commit d2d3091

File tree

6 files changed

+8
-0
lines changed

6 files changed

+8
-0
lines changed

docs/attack-techniques/AWS/aws.execution.ssm-start-session.md

+1
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ References:
3131

3232
- https://awstip.com/responding-to-an-attack-in-aws-9048a1a551ac (evidence of usage in the wild)
3333
- https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/#session-manager
34+
- https://unit42.paloaltonetworks.com/cloud-lateral-movement-techniques/
3435

3536

3637
## Instructions

docs/attack-techniques/AWS/aws.impact.s3-ransomware-individual-deletion.md

+2
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ References:
3939
- [Ransomware in the cloud](https://invictus-ir.medium.com/ransomware-in-the-cloud-7f14805bbe82)
4040
- https://www.firemon.com/what-you-need-to-know-about-ransomware-in-aws/
4141
- https://rhinosecuritylabs.com/aws/s3-ransomware-part-1-attack-vector/
42+
- https://www.invictus-ir.com/news/ransomware-in-the-cloud
43+
- https://dfir.ch/posts/aws_ransomware/
4244

4345

4446
## Instructions

docs/attack-techniques/AWS/aws.lateral-movement.ec2-instance-connect.md

+1
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ References:
3232

3333
- https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-ecs-crypto-mining/#hands-on-keyboard-activity-begins
3434
- https://sysdig.com/blog/2023-global-cloud-threat-report/
35+
- https://unit42.paloaltonetworks.com/cloud-lateral-movement-techniques/
3536

3637

3738
## Instructions

v2/internal/attacktechniques/aws/execution/ssm-start-session/main.go

+1
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ References:
3636
3737
- https://awstip.com/responding-to-an-attack-in-aws-9048a1a551ac (evidence of usage in the wild)
3838
- https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/#session-manager
39+
- https://unit42.paloaltonetworks.com/cloud-lateral-movement-techniques/
3940
`,
4041
Detection: `
4142
Identify, through CloudTrail's <code>StartSession</code> event, when a user is starting an interactive session to multiple EC2 instances. Sample event:

v2/internal/attacktechniques/aws/impact/s3-ransomware-individual-deletion/main.go

+2
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,8 @@ References:
4949
- [Ransomware in the cloud](https://invictus-ir.medium.com/ransomware-in-the-cloud-7f14805bbe82)
5050
- https://www.firemon.com/what-you-need-to-know-about-ransomware-in-aws/
5151
- https://rhinosecuritylabs.com/aws/s3-ransomware-part-1-attack-vector/
52+
- https://www.invictus-ir.com/news/ransomware-in-the-cloud
53+
- https://dfir.ch/posts/aws_ransomware/
5254
`,
5355
Detection: `
5456
You can detect ransomware activity by identifying abnormal patterns of objects being downloaded or deleted in the bucket.

v2/internal/attacktechniques/aws/lateral-movement/ec2-send-ssh-public-key/main.go

+1
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ References:
3939
4040
- https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-ecs-crypto-mining/#hands-on-keyboard-activity-begins
4141
- https://sysdig.com/blog/2023-global-cloud-threat-report/
42+
- https://unit42.paloaltonetworks.com/cloud-lateral-movement-techniques/
4243
`,
4344
Detection: `
4445
Identify, through CloudTrail's <code>SendSSHPublicKey</code> event, when a user is adding an SSH key to multiple EC2 instances. Sample event:

0 commit comments

Comments
 (0)