You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: rules/linux/command_and_control_aws_cli_endpoint_url_used.toml
+10-9Lines changed: 10 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,16 @@
1
1
[metadata]
2
2
creation_date = "2024/08/21"
3
-
integration = ["endpoint"]
3
+
integration = ["endpoint", "crowdstrike"]
4
4
maturity = "production"
5
-
updated_date = "2025/01/15"
5
+
updated_date = "2025/10/17"
6
6
7
7
[rule]
8
8
author = ["Elastic"]
9
9
description = """
10
10
Detects the use of the AWS CLI with the `--endpoint-url` argument, which allows users to specify a custom endpoint URL for AWS services. This can be leveraged by adversaries to redirect API requests to non-standard or malicious endpoints, potentially bypassing typical security controls and logging mechanisms. This behavior may indicate an attempt to interact with unauthorized or compromised infrastructure, exfiltrate data, or perform other malicious activities under the guise of legitimate AWS operations.
11
11
"""
12
12
from = "now-9m"
13
-
index = ["logs-endpoint.events.process-*"]
13
+
index = ["logs-endpoint.events.process-*", "logs-crowdstrike.fdr*"]
0 commit comments