Google Cloud Service Account Impersonation using GCPloit Exploitation Framework


Detect possible Google Cloud Service Account impersonation activity using the gcploit exploitation framework.


Monitor Google Cloud Function Logs and detect if the following sequence of events has occurred within a one minute window:

  • Function is created - with a timeout of 539s (@data.protoPayload.request.function.timeout:539s)
  • Function’s IAM access control policy is enumerated -
  • Function’s IAM access control policy is set -

Triage & Response

  1. Investigate if the function:{{}} was intentionally created by user {{}}.
  2. If unauthorized:
    • Revoke access of compromised credentials.
    • Remove unauthorized cloud functions.
    • Investigate other activities performed by the user {{}} using the Cloud SIEM - User Investigation dashboard.