January 29, 2025 – Content update

We are committed to continuously strengthening security operations for our customers through our innovative DARC Vault fortnightly releases. Just like Microsoft’s Patch Tuesday, the DARC Vault serves as a reliable source for enhanced security content, enabling our users to stay ahead of evolving threats.

Each fortnight, we deliver the latest Out-Of-The-Box (OOTB) content that not only introduces brand-new capabilities but also enhances existing detections. This fortnight, we are excited to announce a significant update focused on AWS S3, VPC and RBI Compliance.

Below is a summary of the new additions and improvements:

Summary of Fortnightly Improvements

Content TypeActionsCount
DetectionsNew17
Enhanced29
DashboardsNew4
ReportsNew12

New Detections

#NameDescriptionRun TypeActive / Inactive
1AWS S3 Bucket Encryption ModifiedDetected modification of bucket encryption. An attacker could modify the encryption of existing buckets, potentially leading to denial of service (DoS) attacks.StandardActive
2AWS S3 Houdini Iniduoh njRAT User-AgentUser-Agent strings used by Houdini/Iniduoh/njRAT malware.StandardActive
3AWS S3 Bucket Versioning DisabledIdentifies when object versioning is suspended for an Amazon S3 bucket. Object versioning allows for multiple versions of an object to exist in the same bucket, aiding in easy recovery of deleted or overwritten objects. Suspending versioning could signal an attempt by an adversary to inhibit system recovery following malicious activity. Additionally, suspension enables the possibility of bucket deletion.StandardActive
4AWS Exfiltration via DataSync TaskThis detection identifies the creation of an AWS DataSync task, potentially indicating data exfiltration. The detection uses AWS CloudTrail logs to pinpoint theCreateTaskevent from the DataSync service. This activity is significant as attackers could exploit DataSync to transfer sensitive data from a private AWS location to a public one, leading to data breaches and compliance violations.StandardActive
5AWS S3 Bucket Server Access Logging DisabledIdentifies when server access logging is disabled for an Amazon S3 bucket. Server access logs provide a detailed record of requests made to an S3 bucket. When server access logging is disabled for a bucket, it could indicate an adversary’s attempt to impair defenses by disabling logs that contain evidence of malicious activity.StandardActive
6AWS S3 Insecure AccessChecks for S3 access attempts where the requester is not an authenticated AWS user.StandardActive
7AWS S3 Bucket Policy Added to Share with External AccountIdentifies an AWS S3 bucket policy change to share permissions with an external account. Adversaries may attempt to backdoor an S3 bucket by sharing it with an external account. This can be used to exfiltrate data or provide access to other adversaries.StandardActive
8AWS S3 Bucket Public Access ModifiedDetects when GetPublicAccessBlock returns NoSuchPublicAccessBlockConfiguration, indicating that the public access block has all values set to false or the feature is disabled.StandardActive
9AWS S3 Exfiltration via Bucket ReplicationThis use case detects API calls enabling S3 bucket replication services through AWS CloudTrail logs. It focuses on identifyingPutBucketReplicationevents and analyzing fields such asbucketName,ReplicationConfiguration.Rule.Destination.Bucket, and user details. Such activities may indicate unauthorized replication attempts, potentially leading to data breaches or compliance violations.StandardActive
10AWS S3 Object Encryption Using External KMS KeyIdentifies CopyObject events within an S3 bucket using an AWS KMS key from an external account for encryption. Adversaries with access to a misconfigured S3 bucket and the proper permissions may encrypt objects with an external KMS key to deny their victims access to their own data.StandardActive
11SMB Traffic over multiple PortsSMB (Server Message Block) traffic is used for file sharing, printer sharing, and other network services in Windows environments. It can occur over various ports, including137(UDP),138(UDP),139(TCP), and445(TCP). Port 445 is commonly used for modern SMB communication, while the others are associated with NetBIOS, primarily supporting legacy SMB configurations. Monitoring and analyzing traffic on these ports can help detect unauthorized or suspicious SMB activity, particularly in Amazon VPC environments.StandardActive
12Anomalous Short ConnectionsIn the context of AWS VPC, a high volume of short connections refers to a large number of brief network connections established and terminated rapidly, which can challenge the VPC’s scalability and performance, particularly in services like load balancers or EC2 instances. Proper architecture and scaling strategies are required to manage such traffic efficiently.StandardActive
13Outbound Traffic over IRC PortsDetects Outbound traffic over IRC ports (6660-6669, 7000, 194 TCP) in AWS VPC flow logs indicates communication with IRC servers. This could be legitimate usage for IRC chat services or indicative of malicious botnet activity. Continuous monitoring of this traffic is crucial for identifying potential security threats.StandardActive
14Large Outbound ICMP PacketsLarge outbound ICMP packets in AWS VPC flow logs suggest a significant volume of data being transmitted via ICMP, which is typically used for network diagnostics (e.g., ping). This could indicate network issues, potential data exfiltration, or malicious activity such as DDoS attacks. Monitoring this traffic is crucial for identifying abnormal or suspicious behavior that may be indicative of an ongoing attack.StandardActive
15Internal Horizontal Port ScanThis detection focuses on identifying internal horizontal port scans within an Amazon VPC (Virtual Private Cloud). A horizontal port scan occurs when a source IP attempts to connect to multiple destination IPs, often to identify open services or vulnerabilities. Monitoring such activity can help detect malicious behavior, such as reconnaissance by an attacker or misconfigured systems generating excessive traffic.StandardActive
16Excessive Reject RequestsExcessive reject requests in AWS VPC flow logs often indicate misconfigurations in security groups, NACLs, or potential malicious activities such as unauthorized access attempts or attacks. Monitoring these logs allows organizations to identify potential security risks or network misconfigurations that may lead to denied network traffic.StandardActive
17Anomalous Traffic by SrcIPThis detection identifies anomalous traffic originating from public IPs associated with the “AMAZON-VPC” source. It leverages statistical outlier detection to highlight source IPs generating unusually high volumes of traffic towards private destinations within a one-day period.StandardActive
New Dashboards

Name
AWS – S3 – Monitoring Insights
AWS – S3 – Security Insights
AWS – VPC – Monitoring Insights
AWS – VPC – Security Insights
New Reports

Name
AWS – S3 – Monitoring Insights
AWS – S3 – Security Insights
AWS – VPC – Monitoring Insights
AWS – VPC – Security Insights
Advance Monitoring Report
Audit Trail Monitoring Report
Data and Endpoint Security Report
Quaterly Threat Summary Report
Security Event and Threat Summary Report
Threat Feed Correlation Report
Threat Monitoring Report
Threat Reponse Time Report
Enhanced Detections

#NameRun TypeActive / Inactive
1Chafer Malware URL PatternoffActive
2Dump LSASS via comsvcs DLLauto-scheduledActive
3VNC from the InternetstreamedActive
4TCP Port 8000 Activity to the InternetoffActive
5Telnet Port ActivityoffActive
6Tor Activity to the InternetstreamedActive
7AWS Lambda Function Created or InvokedoffActive
8AWS Config Disabling Channel RecorderoffActive
9AWS S3 Data Management TamperingoffActive
10AWS EKS Cluster Created or DeletedoffActive
11AWS ElastiCache Security Group Modified or DeletedoffActive
12Restore Public AWS RDS InstanceoffActive
13AWS EC2 Download UserdataoffActive
14AWS Snapshot Backup ExfiltrationoffActive
15AWS CloudTrail Important ChangeoffActive
16Changes to internet facing AWS RDS Database instancesoffActive
17AWS EC2 Disable EBS EncryptionoffActive
18AWS GuardDuty Important ChangeoffActive
19AWS EFS Fileshare Mount Modified or DeletedoffActive
20AWS Suspicious SAML ActivityoffActive
21AWS RDS Master Password ChangeoffActive
22AWS EC2 VM Export FailureoffActive
23AWS EC2 Startup Shell Script ChangeoffActive
24AWS SecurityHub Findings EvasionoffActive
25AWS EFS Fileshare Modified or DeletedoffActive
26AWS Macie EvasionoffActive
27Changes made to AWS CloudTrail logsoffActive
28Multiple Failed API Requests From Same Source IPoffActive
29AWS Glue Development Endpoint ActivityoffActive