Skip to content
Threat Feed
medium advisory

Azure AD Authentication to Important Apps Using Single-Factor Authentication

Detection of successful Azure AD authentications to critical applications that only required single-factor authentication, potentially indicating a security lapse or policy violation leading to unauthorized access.

This alert focuses on detecting potentially risky authentication events within Azure Active Directory. Specifically, it flags successful logins to applications deemed “important” where the authentication process only involved a single factor. This bypasses the added security of multi-factor authentication (MFA), potentially exposing these applications to compromise if the single factor (e.g., password) is weak, stolen, or compromised. The alert is designed to identify deviations from a secure authentication baseline, particularly in environments where MFA is expected for sensitive resources. The applications considered “important” must be pre-defined by the defender for this detection to function effectively.

Attack Chain

  1. An attacker gains access to a valid username and password through phishing, credential stuffing, or other means.
  2. The attacker attempts to authenticate to a pre-defined, high-value application within the Azure AD environment.
  3. Azure AD processes the authentication request.
  4. The application is configured to allow single-factor authentication.
  5. Azure AD verifies the supplied username and password against its directory.
  6. Upon successful verification, Azure AD grants the attacker access to the application.
  7. The attacker gains unauthorized access to the application’s data and functionality.
  8. Depending on the application and attacker’s motives, this could lead to data exfiltration, privilege escalation, or other malicious activities.

Impact

The impact of successful single-factor authentication to critical applications can range from minor data breaches to significant compromises of sensitive systems. The number of potential victims depends on the application’s user base and the sensitivity of the data it manages. Sectors most at risk include those handling financial, healthcare, or sensitive personal information. A successful attack could lead to data theft, financial loss, reputational damage, and regulatory penalties.

Recommendation

  • Populate the AppId field in the Sigma rule with the Application IDs of your organization’s critical applications.
  • Investigate any alerts generated by the Sigma rule to determine the legitimacy of the single-factor authentication.
  • Enforce multi-factor authentication (MFA) for all users accessing critical applications to mitigate the risk of credential compromise.
  • Review and update Azure AD Conditional Access policies to ensure appropriate authentication requirements are in place.
  • Tune the Sigma rule based on observed false positives in your environment.

Detection coverage 2

Azure AD Authentication to Important Apps Using Single Factor Authentication

medium

Detects successful authentication to important application(s) using only single-factor authentication.

sigma tactics: initial-access, persistence, privilege-escalation, stealth techniques: T1078 sources: azure, signinlogs

Azure AD Authentication to Multiple Important Apps Using Single Factor Authentication

high

Detects successful authentication to multiple important application(s) using only single-factor authentication from a single user.

sigma tactics: initial-access, persistence, privilege-escalation, stealth techniques: T1078 sources: azure, signinlogs

Detection queries are kept inside the platform. Get full rules →