DataDog / stratus-red-team

:cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud
https://stratus-red-team.cloud
Apache License 2.0
1.83k stars 215 forks source link

New attack technique: Usage of SendSerialConsoleSSHPublicKey on multiple instances #599

Open adanalvarez opened 3 hours ago

adanalvarez commented 3 hours ago

What does this PR do?

Motivation

I saw that this was an open and prioritized issue https://github.com/DataDog/stratus-red-team/issues/487

There are multiple reports of this technique being exploited in the wild.

To exploit SendSerialConsoleSSHPublicKey, an attacker must first enable EC2 Serial Console access. I did not enable this in the warm-up phase because Permiso has observed this behavior as part of a larger attack. In their report, Permiso describes how attackers enable EC2 Serial Console access in compromised AWS accounts and then attempt to use SendSerialConsoleSSHPublicKey.

If EC2 Serial Console access is already enabled, I leave it as is to avoid disabling it.

I'm not sure if there is an automation to generate the logs with Grimoire, so I haven't added this.

Checklist