Article Details

Scrape Timestamp (UTC): 2023-12-06 13:49:30.274

Source: https://thehackernews.com/2023/12/alert-threat-actors-can-leverage-aws.html

Original Article Text

Click to Toggle View

Alert: Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts. Threat actors can take advantage of Amazon Web Services Security Token Service (AWS STS) as a way to infiltrate cloud accounts and conduct follow-on attacks. The service enables threat actors to impersonate user identities and roles in cloud environments, Red Canary researchers Thomas Gardner and Cody Betsworth said in a Tuesday analysis. AWS STS is a web service that enables users to request temporary, limited-privilege credentials for users to access AWS resources without needing to create an AWS identity. These STS tokens can be valid anywhere from 15 minutes to 36 hours. Threat actors can steal long-term IAM tokens through a variety of methods like malware infections, publicly exposed credentials, and phishing emails, subsequently using them to determine roles and privileges associated with those tokens via API calls. "Depending on the token's permission level, adversaries may also be able to use it to create additional IAM users with long-term AKIA tokens to ensure persistence in the event that their initial AKIA token and all of the ASIA short term tokens it generated are discovered and revoked," the researcher said. In the next stage, an MFA-authenticated STS token is used to create multiple new short-term tokens, followed by conducting post-exploitation actions such as data exfiltration. To mitigate such AWS token abuse, it's recommended to log CloudTrail event data, detect role-chaining events and MFA abuse, and rotate long-term IAM user access keys. "AWS STS is a critical security control for limiting the use of static credentials and the duration of access for users across their cloud infrastructure," the researchers said. "However, under certain IAM configurations that are common across many organizations, adversaries can also create and abuse these STS tokens to access cloud resources and perform malicious actions."

Daily Brief Summary

CYBERCRIME // How Hackers Exploit AWS Tokens to Infiltrate Cloud Accounts

AWS STS allows for temporary, limited-privilege credentials, which can be exploited by threat actors to gain unauthorized cloud access.

Malware, exposed credentials, and phishing can result in stolen IAM tokens, enabling attackers to determine associated roles and privileges.

Attackers might create new IAM users with long-term tokens, ensuring their access persists even after revocation of their initial tokens.

Short-term STS tokens secured with MFA can be abused to create multiple new tokens and perform malicious activities like data exfiltration.

Recommendations to mitigate AWS token abuse include logging CloudTrail events, detecting abnormal role-chaining, and rotating IAM user keys.

While AWS STS enhances security by limiting credential use, misconfigurations in IAM can lead to adversaries leveraging STS tokens for access and malicious operations.