[New Hunt] Adding Hunting Query for IAM Unusual Default Aviatrix Role Activity
#4409
+74
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Pull Request
Issue link(s):
Summary - What I changed
Adds a hunting query for unusual Aviatrix role activity. This is an assumed role in AWS that, if the EC2 instance were compromised, would be used to carry out additional TTPs. The temporary credentials gathered from IMDSv2 are tied directly to the role assigned to the EC2 instance. The Aviatrix network controller, when deployed in AWS, is deployed on an EC2 instance with these default roles.
Ref: https://docs.aviatrix.com/documentation/latest/platform-administration/accounts-and-users/iam-role.html
How To Test
Unable to deploy a vulnerable version from the marketplace as these were removed. We did develop a Python script to our best understanding and launch at a publicly deployed controller in our AWS environment to mimic the requests. Please see the TRADE issue for more details.
Checklist
bug
,enhancement
,schema
,maintenance
,Rule: New
,Rule: Deprecation
,Rule: Tuning
,Hunt: New
, orHunt: Tuning
so guidelines can be generatedmeta:rapid-merge
label if planning to merge within 24 hoursContributor checklist