EXPLORE
← Back to Explore
sigmamediumHunting

AWS RDS Master Password Change

Detects the change of database master password. It may be a part of data exfiltration.

MITRE ATT&CK

exfiltration

Detection Query

selection_source:
  eventSource: rds.amazonaws.com
  responseElements.pendingModifiedValues.masterUserPassword|contains: "*"
  eventName: ModifyDBInstance
condition: selection_source

Author

faloker

Created

2020-02-12

Data Sources

awscloudtrail

Platforms

aws

Tags

attack.exfiltrationattack.t1020
Raw Content
title: AWS RDS Master Password Change
id: 8a63cdd4-6207-414a-85bc-7e032bd3c1a2
status: test
description: Detects the change of database master password. It may be a part of data exfiltration.
references:
    - https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/rds__explore_snapshots/main.py
author: faloker
date: 2020-02-12
modified: 2022-10-05
tags:
    - attack.exfiltration
    - attack.t1020
logsource:
    product: aws
    service: cloudtrail
detection:
    selection_source:
        eventSource: rds.amazonaws.com
        responseElements.pendingModifiedValues.masterUserPassword|contains: '*'
        eventName: ModifyDBInstance
    condition: selection_source
falsepositives:
    - Benign changes to a db instance
level: medium