New cloud security research! We found a method to bypass CloudTrail logging for specific IAM actions via an undocumented API service! Attackers could perform some reconnaissance activities while being undetected.
https://securitylabs.datadoghq.com/articles/iamadmin-cloudtrail-bypass/
AWS CloudTrail vulnerability: Undocumented API allows CloudTrail bypass | Datadog Security Labs
Public disclosure of a method to bypass CloudTrail for specific IAM actions.
As a security researcher, I think one of the most interesting areas of cloud sec research is in defense evasion. Because CSP customers are reliant on built in logging methods (such as CloudTrail) to determine what occurred during an intrusion.
Most threat actors take the noisy approach of brute forcing to enumerate permissions and resources in the environment. We saw this just recently in an excellent article from
@expel https://expel.com/blog/incident-report-stolen-aws-access-keys/
Incident report: stolen AWS access keys
Here we walk through what happens when attackers steal a set of AWS access keys. Recently, our SOC, threat hunting, and detection engineering teams collaborated on such an incident.
ExpelBut if an adversary could do that enumeration/reconnaissance without logging to CloudTrail, they could be completely invisible to the customer. I explored this a bit in some previous research:
https://frichetten.com/blog/aws-api-enum-vuln/
Enumerate AWS API Permissions Without Logging to CloudTrail
Writeup for a bug I discovered in the AWS API that would allow you to enumerate certain permissions for a role without logging to CloudTrail.