Azure AD User Password Reset Detection
Detects when a user successfully resets their own password in Azure Active Directory, which may indicate malicious activity or account compromise.
This threat brief focuses on detecting user-initiated password resets within Azure Active Directory (Azure AD). While legitimate password resets are common, monitoring this activity can help identify potentially malicious behavior, such as an attacker attempting to gain unauthorized access to an account or an insider threat actor escalating privileges. Attackers may leverage compromised credentials or social engineering to initiate password resets, bypassing multi-factor authentication (MFA) if it is not properly configured or enforced. This detection is important for defenders because successful password resets can lead to a complete account takeover, allowing attackers to access sensitive data, resources, and systems.
Attack Chain
- An attacker gains initial access to a user’s credentials through phishing, credential stuffing, or malware.
- The attacker attempts to log in to an Azure AD-protected resource using the compromised credentials.
- The attacker fails to authenticate, either because they do not have the correct password or MFA is enabled.
- The attacker initiates a password reset request using the “Forgot password” feature or a similar mechanism.
- Azure AD sends a password reset verification code or link to the user’s registered email address or phone number.
- If the attacker controls the registered email address or phone number (due to prior compromise), they can access the verification code or link.
- The attacker uses the verification code or link to set a new password for the user’s Azure AD account.
- The attacker logs in to the Azure AD account with the new password, gaining unauthorized access.
Impact
Successful password resets by attackers can lead to complete account takeover, allowing them to access sensitive data, resources, and systems protected by Azure AD. This can result in data breaches, financial loss, reputational damage, and disruption of business operations. The impact depends on the privileges and permissions assigned to the compromised account.
Recommendation
- Deploy the Sigma rule
Password Reset By User Accountto your SIEM to detect user-initiated password resets in Azure AD audit logs. - Investigate any detected password resets, especially those initiated by users who have not recently requested a password change.
- Review and enforce multi-factor authentication (MFA) policies to prevent attackers from bypassing password-based authentication.
- Monitor Azure AD audit logs for suspicious activity related to password resets, such as multiple failed login attempts followed by a successful reset.
Detection coverage 2
Azure AD - Password Reset By User Account
mediumDetect when a user has reset their password in Azure AD
Azure AD - Password Reset Failed Attempt
lowDetect failed attempts to reset a password in Azure AD which may indicate reconnaissance or credential harvesting
Detection queries are kept inside the platform. Get full rules →