Skip to content

Commit 5929e67

Browse files
Adan Álvareznasbench
andauthored
Merge PR #5688 from @adanalvarez - AWS STS GetCallerIdentity Enumeration Via TruffleHog
new: AWS STS GetCallerIdentity Enumeration Via TruffleHog --------- Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
1 parent c470105 commit 5929e67

File tree

1 file changed

+28
-0
lines changed

1 file changed

+28
-0
lines changed
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
title: AWS STS GetCallerIdentity Enumeration Via TruffleHog
2+
id: 9b1b8e9b-0a5d-4af1-9d2f-4c4b6e7c2c9d
3+
status: experimental
4+
description: |
5+
Detects the use of TruffleHog for AWS credential validation by identifying GetCallerIdentity API calls where the userAgent indicates TruffleHog.
6+
Threat actors leverage TruffleHog to enumerate and validate exposed AWS keys.
7+
Successful exploitation allows threat actors to confirm the validity of compromised AWS credentials, facilitating further unauthorized access and actions within the AWS environment.
8+
references:
9+
- https://www.rapid7.com/blog/post/tr-crimson-collective-a-new-threat-group-observed-operating-in-the-cloud/
10+
- https://docs.aws.amazon.com/STS/latest/APIReference/API_GetCallerIdentity.html
11+
- https://github.com/trufflesecurity/trufflehog
12+
author: Adan Alvarez @adanalvarez
13+
date: 2025-10-12
14+
tags:
15+
- attack.discovery
16+
- attack.t1087.004
17+
logsource:
18+
product: aws
19+
service: cloudtrail
20+
detection:
21+
selection:
22+
eventSource: 'sts.amazonaws.com'
23+
eventName: 'GetCallerIdentity'
24+
userAgent|contains: 'TruffleHog'
25+
condition: selection
26+
falsepositives:
27+
- Legitimate internal security scanning or key validation that intentionally uses TruffleHog. Authorize and filter known scanner roles, IP ranges, or assumed roles as needed.
28+
level: medium

0 commit comments

Comments
 (0)