[HN Gopher] Tell HN: AWS warns us about irregular activity relat...
       ___________________________________________________________________
        
       Tell HN: AWS warns us about irregular activity related to Log4shell
        
       We received a few emails from AWS about irregular activity related
       to Log4shell. I asked a few friends, and they got similar messages
       as well.  AWS provided a list of EC2 instances where they saw DNS
       queries which are typically used when targeting the log4j
       vulnerability, but they did not provide further information.  Have
       you received similar notification? What have you done about
       suspicious instances?  The ironic part is that AWS did that on
       Friday while half of the internet was making memes about the fact
       that the Log4j vulnerability was disclosed on Friday.
        
       Author : stunt
       Score  : 51 points
       Date   : 2021-12-18 20:33 UTC (2 hours ago)
        
       | taf2 wrote:
       | We received this as well except
       | 
       | 1. We don't use Java 2. The instances in the email are not in our
       | accounts
       | 
       | We later received another email providing some vague reasons for
       | this...
       | 
       | On a Friday evening I was not very happy spending time trying to
       | hunt down the invalid instances
        
         | bink wrote:
         | We received notifications for instances that do not and have
         | never run java as well. These instances don't provide DNS
         | resolution for any other hosts or act as proxies. I'm curious
         | if there was some data corruption on the AWS side.
        
         | gunapologist99 wrote:
         | Wow... I'd be curious as to whether or not this has occurred to
         | anyone else. What were the vague reasons?
        
           | mtmail wrote:
           | We had a non-AWS false positive: when sending the log4j
           | exploit string with prepared unique subdomain via email there
           | was an anti-spam system which did a DNS request on the
           | subdomain. Apparently it looks for any content remotely
           | looking like a URL and probes it. Similar to what was
           | reported about Protonmail here
           | https://news.ycombinator.com/item?id=29537549
        
           | taf2 wrote:
           | Here it is below - for us it was #4 which i should clearify
           | was not vague just my tired memory of it - since once i
           | received this i was very relieved and proceeded to sleep. I
           | can tell they are definitely trying and IMO doing the right
           | thing with their efforts below was the followup email that
           | let us get sleep.
           | 
           | Earlier today, we provided you a notification with a list of
           | instances that may still be running a version of log4j that
           | has a known security vulnerability and needs to be patched.
           | We want to provide you additional details about that email.
           | 
           | The list of instances was obtained by monitoring for specific
           | DNS queries which are typically used when targeting the log4j
           | vulnerability. These DNS lookups can indicate that someone is
           | attempting to exploit the log4j vulnerability on your
           | instance. Each of the instances provided has made a DNS
           | lookup to one of the suspect domains between 12:00 AM and
           | 11:59 PM PST on December 16th 2021. While we are not able to
           | tell whether the instance was compromised, we strongly
           | recommend that you take action to update log4j across all of
           | your Java environments, whether they are publicly accessible
           | or not.
           | 
           | In some cases, the list of instances included instance IDs
           | that may not currently be present within your EC2
           | environment. This happened for a number of reasons:
           | 
           | 1. EC2 instances may have been terminated since the scan was
           | completed at 11:59 AM PST on December 16th 2021;
           | 
           | 2. EC2 instances that have been stopped and restarted may
           | appear with the incorrect instance ID;
           | 
           | 3. ECS, EKS, and Fargate containers have been included with
           | the underlying instance ID instead of the container ID;
           | 
           | 4. EC2 instances used by underlying network services were
           | erroneously included in the list of instances. These services
           | are not themselves running unpatched log4j, but can be
           | indicative of these DNS queries coming from within your VPC.
           | 
           | While it is not always possible for us to pinpoint the exact
           | instances making these DNS queries, it is critically
           | important that you patch all Java environments for the log4j
           | issue, whether they are publicly accessible or not. To help
           | you, we are also providing a 15-day free trial to Amazon
           | Inspector which can assist you in finding vulnerable
           | resources by scanning your Amazon Elastic Compute Cloud (EC2)
           | instances and container images for the log4j vulnerability.
           | 
           | Please take the steps explained in this security blog post
           | [1] to protect your resources. You also can find more
           | information about log4j in our security bulletin [2].
           | 
           | If you have any questions or concerns, please reach out to
           | AWS Support [3].
           | 
           | [1] https://aws.amazon.com/blogs/security/using-aws-security-
           | ser... [2] https://aws.amazon.com/security/security-
           | bulletins/AWS-2021-... [3]
           | https://console.aws.amazon.com/support
        
       | pwarner wrote:
       | I think this is what AWS GuardDuty is supposed to do?
       | 
       | Edit: https://aws.amazon.com/blogs/security/using-aws-security-
       | ser...
       | 
       | GuardDuty In addition to finding the presence of this
       | vulnerability through Inspector, the Amazon GuardDuty team has
       | also begun adding indicators of compromise associated with
       | exploiting the Log4j vulnerability, and will continue to do so.
       | GuardDuty will monitor for attempts to reach known-bad IP
       | addresses or DNS entries, and can also find post-exploit activity
       | through anomaly-based behavioral findings. For example, if an
       | Amazon EC2 instance starts communicating on unusual ports,
       | GuardDuty would detect this activity and create the finding
       | Behavior:EC2/NetworkPortUnusual. This activity is not limited to
       | the NetworkPortUnusual finding, though. GuardDuty has a number of
       | different findings associated with post exploit activity that
       | might be seen in response to a compromised AWS resource. For a
       | list of GuardDuty findings, please refer to this GuardDuty
       | documentation.
        
       | ldoughty wrote:
       | Being a new and highly visible Target, maybe AWS sent out for
       | positive emails when it saw an attempt on your VM? Or maybe one
       | of AWS's DNS servers was listed by AWS as being used by hackers,
       | and your own VM happened to use AWS DNS resolution?
       | 
       | Just some thoughts. Sucks to lose time, but the notices probably
       | helped more than it hurt? Part of the price of modern defense to
       | get false positives...
       | 
       | If I get a suspicious instance, I usually snapshot the disk and
       | blow it away. We don't have a lot of resources for investigation,
       | but we'd probably look at what we can get from logs, check scope
       | of damage, and likely move on... We only run instances when we
       | have no other choice, so they generally are pushed data, with no
       | real pull access.
        
       | jeppesen-io wrote:
       | If I got the same (I have not seen the same for my AWS accounts),
       | I would start capturing DNS traffic ASAP. Either at the VPC or
       | host level. Cheap and easy to do most of the time
       | 
       | If not running Java (including agents), it may indicate some
       | other type of compromise. Not something you should really ignore.
       | Look at logs, cpu, disk, port usage just to start
        
         | laurent92 wrote:
         | All of this tells me that the number of possible vulns x the
         | number of startups/companies managing their EC2 x numbers of
         | OSes, libraries and platforms... Our current Internet is in an
         | appalling state of security and keeping up to date will require
         | tethering our OSes to something central that manages security
         | upgrades very fast...
        
       | ruffrey wrote:
       | We received this. We have no Java.
       | 
       | The notification from AWS referenced an instance we don't have.
       | 
       | Some clarification from AWS would be nice. It made me wonder if
       | it was related to an ELB or something.
        
       ___________________________________________________________________
       (page generated 2021-12-18 23:00 UTC)