Jun 24, 2021

The Threat Detection with Cloud API Logs: A Case Study from Capital One

 

My notes:

  • Methodologies for Cyber Threat Intelligence: [06:00]
    • Blacklist - hashes, IP, ports, 
    • Statistical Analysis
    • Behavior Analysis - Mitre Att&ck (intention/tactics) [06:55]
  • Case Study : Capital One Attack [08:58]
    • T1595: Active scanning
    • T1190: Exploit webap (SSRF) [13:25]  
    • T1552: Access EC2 metadata service [14:14]
    • T1526: Discover Token to access to all S3 bucket [15:20] 
    • T1530: Data exfil from S3 cloud storage
  • The Cloud API Service [18:50]
  • CloudTrail - for threat hunting using API calls [20:00]  
  • Azure Resource Provider Operations [30:00]
    • Portal
    • CLI: az privoder operation list
  • Azure Activity Log [33:13]
    • only provides Create, Update, Delete (no Read)
    • Grouped by correlation ID
  • Azure IMDSv1 Vs IMDSv2