T1578.001

Create Snapshot

Adversaries may create a snapshot or data backup within a cloud account to evade defenses and gain access to restricted compute infrastructure. A snapshot is a point-in-time copy of a cloud compute component such as a virtual machine (VM), virtual hard drive, or volume. After creating a snapshot, an adversary can create a new cloud instance, mount the snapshot to it, and apply permissive policies (such as firewall rules allowing SSH/RDP) that bypass restrictions enforced on the original resource. This allows access to data and configurations on the original volume without triggering alerts tied to direct access of the live instance. The Pacu AWS exploitation framework includes modules to enumerate and create EBS snapshots and RDS snapshots. Snapshot creation may also precede cross-account sharing, where the adversary modifies snapshot attributes to share it with an attacker-controlled AWS account for offline analysis.

Microsoft Sentinel / Defender
kusto
// Detect suspicious cloud snapshot creation and sharing across Azure (AzureActivity) and AWS (AWSCloudTrail)
let LookbackWindow = 24h;
let BulkThreshold = 5;
// --- Azure: Snapshot creation via Resource Manager ---
let AzureSnapshots = AzureActivity
| where TimeGenerated > ago(LookbackWindow)
| where OperationNameValue =~ "MICROSOFT.COMPUTE/SNAPSHOTS/WRITE"
| where ActivityStatusValue =~ "Succeeded"
| extend SnapshotName = tostring(split(ResourceId, "/")[-1])
| extend SubscriptionId = tostring(split(ResourceId, "/")[2])
| extend ResourceGroupName = tostring(split(ResourceId, "/")[4])
| project TimeGenerated, CloudProvider="Azure",
          Caller, CallerIpAddress,
          ResourceId, SnapshotName, ResourceGroupName, SubscriptionId,
          OperationName=OperationNameValue,
          IsExternalShare=false;
// --- AWS: Snapshot creation and sharing via CloudTrail ---
let AWSSnapshots = AWSCloudTrail
| where TimeGenerated > ago(LookbackWindow)
| where EventName in ("CreateSnapshot", "CopySnapshot", "CreateDBSnapshot",
                       "CreateDBClusterSnapshot", "ModifySnapshotAttribute",
                       "ModifyDBSnapshotAttribute")
| extend SourceVolumeId = tostring(parse_json(RequestParameters).volumeId)
| extend SnapshotId = tostring(parse_json(ResponseElements).snapshotId)
| extend IsExternalShare = (EventName == "ModifySnapshotAttribute" and
         tostring(parse_json(RequestParameters).attributeType) == "createVolumePermission")
| project TimeGenerated, CloudProvider="AWS",
          Caller=UserIdentityArn, CallerIpAddress=SourceIpAddress,
          ResourceId=coalesce(SnapshotId, SourceVolumeId),
          SnapshotName=coalesce(SnapshotId, EventName),
          ResourceGroupName="", SubscriptionId=RecipientAccountId,
          OperationName=EventName, IsExternalShare;
// --- Combine and enrich ---
union AzureSnapshots, AWSSnapshots
| extend HourOfDay = hourofday(TimeGenerated)
| extend IsOffHours = (HourOfDay < 7 or HourOfDay > 19)
| extend IsWeekend = (dayofweek(TimeGenerated) == 0d or dayofweek(TimeGenerated) == 6d)
| summarize SnapshotCount=count(),
            FirstEvent=min(TimeGenerated),
            LastEvent=max(TimeGenerated),
            Operations=make_set(OperationName),
            SnapshotNames=make_set(SnapshotName, 10),
            SourceIPs=make_set(CallerIpAddress),
            ExternalShareCount=countif(IsExternalShare == true),
            OffHoursCount=countif(IsOffHours == true)
            by Caller, CloudProvider, SubscriptionId
| extend SuspicionScore = case(
    ExternalShareCount > 0, 3,
    SnapshotCount > BulkThreshold and OffHoursCount > 0, 3,
    SnapshotCount > BulkThreshold, 2,
    OffHoursCount > 0, 1,
    1)
| where SnapshotCount > 1 or ExternalShareCount > 0
| project FirstEvent, LastEvent, CloudProvider, Caller, SourceIPs,
          SnapshotCount, ExternalShareCount, OffHoursCount,
          Operations, SnapshotNames, SubscriptionId, SuspicionScore
| sort by SuspicionScore desc, SnapshotCount desc
high severity medium confidence

Data Sources

Cloud Service: Cloud Service Modification Azure Activity Logs AWS CloudTrail

Required Tables

AzureActivity AWSCloudTrail

False Positives

  • Automated backup solutions (AWS Backup, Azure Backup, third-party tools like Veeam) running scheduled snapshot jobs — these will appear as bulk creation from service principals or IAM roles
  • Disaster recovery and business continuity operations where admins create snapshots before major maintenance windows, often outside business hours
  • DevOps pipelines using Infrastructure-as-Code (Terraform, CloudFormation, Pulumi) that create and destroy snapshots as part of environment provisioning
  • Cloud-native services such as AWS Data Lifecycle Manager or Azure Disk Snapshot policies that automate snapshot rotation at scale
  • Cross-account sharing for legitimate DR scenarios where snapshots are replicated to a dedicated recovery AWS account

Unlock Pro Content

Get the full detection package for T1578.001 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections