Skip to main content

Suspicious AWS API calls indicating new image being pushed to AWS ECR with latest tag

ID:aws_ecr_image_latest_suspicious
Data type:AWS CloudTrail
Severity:
Informational
-
Medium
MITRE ATT&CK:TA0005:T1578

Description

AlphaSOC detected the use of the PutImage action with "imageTag": "latest" to create or update an image manifest and its associated tags in Amazon Elastic Container Registry (ECR). This activity suggests potential malicious intent, such as preparing for container-based attacks, establishing persistence, or poisoning the CI/CD pipeline. While ECR image uploads are common in cloud environments, they can also be leveraged by adversaries to introduce malicious containers.

Impact

The use of PutImage with the latest tag could allow adversaries to replace existing images with malicious versions, potentially leading to the execution of unauthorized code within the container environment. This can result in data breaches, resource hijacking, lateral movement within the network, or serve as a foothold for further attacks. Compromised container images may also be used to exfiltrate sensitive data or mine cryptocurrency.

Severity

SeverityCondition
Informational
Unexpected action, ASN, user agent or region
Low
Two unexpected properties at the same time
Medium
Three unexpected properties at the same time

Investigation and Remediation

Investigate the source and content of the uploaded image. Verify if the upload was authorized and performed by a legitimate user. Scan the image for vulnerabilities and malware. If the image is determined to be malicious, remove it from ECR immediately. Review access logs and user permissions for ECR. If compromise is confirmed, rotate credentials and review other potentially affected resources.