EXPLORE
← Back to Explore
sigmahighHunting

Restore Public AWS RDS Instance

Detects the recovery of a new public database instance from a snapshot. It may be a part of data exfiltration.

MITRE ATT&CK

exfiltration

Detection Query

selection_source:
  eventSource: rds.amazonaws.com
  responseElements.publiclyAccessible: "true"
  eventName: RestoreDBInstanceFromDBSnapshot
condition: selection_source

Author

faloker

Created

2020-02-12

Data Sources

awscloudtrail

Platforms

aws

Tags

attack.exfiltrationattack.t1020
Raw Content
title: Restore Public AWS RDS Instance
id: c3f265c7-ff03-4056-8ab2-d486227b4599
status: test
description: Detects the recovery of a new public database instance from a snapshot. It may be a part of data exfiltration.
references:
    - https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/rds__explore_snapshots/main.py
author: faloker
date: 2020-02-12
modified: 2022-10-09
tags:
    - attack.exfiltration
    - attack.t1020
logsource:
    product: aws
    service: cloudtrail
detection:
    selection_source:
        eventSource: rds.amazonaws.com
        responseElements.publiclyAccessible: 'true'
        eventName: RestoreDBInstanceFromDBSnapshot
    condition: selection_source
falsepositives:
    - Unknown
level: high