This search looks for AWS CloudTrail events where a user A who has already permission to update login profile, makes an API call to update login profile for another user B . Attackers have been know to use this technique for Privilege Escalation in case new victim(user B) has more permissions than old victim(user B)
AWS Updateloginprofile Help
You must install splunk AWS add on and Splunk App for AWS. This search works with AWS CloudTrail logs.
Open in Search