Suspicious access of BEC related documents in AWS S3 buckets

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


'This query looks for users with suspicious spikes in the number of files accessed that relate to topics commonly accessed as part of Business Email Compromise (BEC) attacks. The query looks for access to files in AWS S3 storage that relate to topics such as invoices or payments, and then looks for users accessing these files in significantly higher numbers than in the previous 14 days. Incidents raised by this analytic should be investigated to see if the user accessing these files should be ac

Attribute Value
Type Analytic Rule
Solution Business Email Compromise - Financial Fraud
ID f3e2d35f-1202-4215-995c-4654ef07d1d8
Severity Medium
Kind Scheduled
Tactics Collection
Techniques T1530
Required Connectors AWS
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
AWSCloudTrail ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Business Email Compromise - Financial Fraud