An EBS snapshot block was downloaded

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2025-11-09
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • AWS Audit Log

Detection Modules

Cloud

Detector Tags

Cloud Data Asset Exfiltration, Data Detection & Response

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

An EBS snapshot block was downloaded using the EBS direct API.
This may indicate an attacker's attempt to exfiltrate data from a volume snapshot in the cloud environment.

Attacker's Goals

Exfiltrate sensitive data from the cloud environment.

Investigative actions

  • Check the accessed snapshot and corresponding volume.
  • Monitor additional snapshot blocks downloads from the snapshot.
  • Verify that the identity did not download any sensitive information that it shouldn't.

Variations

An EBS snapshot block was downloaded from a snapshot with sensitive data

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Medium

Description

An EBS snapshot block was downloaded using the EBS direct API.
This may indicate an attacker's attempt to exfiltrate data from a volume snapshot in the cloud environment.
The snapshot contains sensitive data.

Attacker's Goals

Exfiltrate sensitive data from the cloud environment.

Investigative actions

  • Check the accessed snapshot and corresponding volume.
  • Monitor additional snapshot blocks downloads from the snapshot.
  • Verify that the identity did not download any sensitive information that it shouldn't.


An unusual download of EBS snapshot block

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An EBS snapshot block was downloaded using the EBS direct API.
This may indicate an attacker's attempt to exfiltrate data from a volume snapshot in the cloud environment.
The operation was not performed by this identity in the last 30 days.

Attacker's Goals

Exfiltrate sensitive data from the cloud environment.

Investigative actions

  • Check the accessed snapshot and corresponding volume.
  • Monitor additional snapshot blocks downloads from the snapshot.
  • Verify that the identity did not download any sensitive information that it shouldn't.