Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
Cloud |
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
One or more EBS snapshots were created from an EC2 instances.
Attacker's Goals
- Clone existing compute volumes for exfiltration purposes.
- This action may be a preliminary action before downloading snapshot blocks or creating volumes from the snapshots.
Investigative actions
- Confirm that the identity intended to create the described snapshots.
- Monitor the source instance for additional suspicious activities.
- Follow further actions done by the identity.
Variations
EBS snapshots were created from an EC2 instance attached one or more volumes with sensitive dataAn unusual creation of EBS snapshots from an EC2 instances