CloudIntel Attacks Monitoring Project
This repository hosts resources and findings from a project aimed at monitoring attacks on Public Cloud infrastructure, particularly focusing on cloud-native and cloud-only threats.
Features
- Real-time data on malicious IP addresses, updated every 24 hours.
- (Under development) Malicious file detection API.
- Ongoing publication of data on GitHub.
Consuming IOCs from this Repository
This repository is structured to aid in the monitoring of Public Cloud infrastructure attacks, with a focus on cloud-native and cloud-only threats. It includes:
- Indicators of Compromise (IOCs)
- Malware Analysis
- Malware Samples
Usage
To retrieve a comprehensive list of malicious IPs, which is about 30 times larger than the public list on GitHub, use the cloudintel API as follows:
Demo credentials
Feel free to use demo key and Email for testing (This key/Email can change without any notice for andy prod usage please ask for the key) The Email and key are enclosed between double "quotes"
Demo Email : "[email protected]" Demo Key : "key{democloudintel}"
Email OR fill this form
For your API key pleasecurl -X GET \
'https://api.cloudintel.info/v1/maliciousip?date=MM-DD-YYYY' \
-H 'x-api-key: [Your_API_Key]' \
-H 'x-email: [Your_Email]'
Note:
Replace MM-DD-YYYY with the specific date for which you want to fetch IP addresses. For example, to fetch IPs for December 25, 2023
, replace MM-DD-YYYY
it with 12-25-2023
.
Ensure to include your API key and email in the respective placeholders [Your_API_Key] and [Your_Email].
Response format: JSON containing all observed malicious IP addresses.
Case Study/Success Stories
- My findings are published over : https://blog.himanshuanand.com/
- TBD (If you have any new findings then please do share it with us, will link it here)
How to Use this Repository
- Understanding the Repository Structure: Each folder is named with a date (DD-MM-YYYY) and contains daily collected IOCs.
- Reviewing Usage Warning: Before using these IOCs, be aware of the risks. Executing code without understanding could be harmful.
- Accessing Malware Analysis: For insights into the malware samples and their analysis, refer to the corresponding dated folders.
- Consuming IOCs: Detailed instructions on how to consume these IOCs in your security operations will be provided in the IOC Consumption Guide. This guide will offer step-by-step instructions on how to integrate, automate, and utilize these IOCs with cloud services.
- Contributing: If you have updates or additional IOCs, see the Contribution Guidelines.
- Getting Support: For questions or support, open an issue or reach out to me[at]himanshuanand.com.
Documentation
For full details, visit our Wiki.
Feature Requests and Contributions
For feature requests or contributions, open an issue.
Media Coverage
Our project, CloudIntel, has been featured in various publications. Here's one of the articles discussing the impact and importance of CloudIntel in cloud security:
- Cloud Security with CloudIntel: A User-Friendly Approach to Safeguarding Public Cloud Infrastructure - eForensics Magazine
Acknowledgements
Special thanks to Michel Bamps for his expertise and assistance in integrating Cloudflare Workers with R2, a crucial part of the AWSAttacks infrastructure.
Remember to use the IOCs within the bounds of the MIT License and understand that this is a personal project, not associated with any employer.
For deeper insights into the project's purpose and methodology, refer to the accompanying blog post.