Detect Application AppID URI Configuration Changes in Azure
Detection of configuration changes to an application's AppID URI in Azure, potentially indicating malicious activity related to initial access, persistence, credential access, privilege escalation, or stealth.
Attackers may modify the AppID URI of an application in Azure to facilitate various malicious activities, including gaining unauthorized access, establishing persistence, accessing credentials, escalating privileges, or maintaining stealth within the environment. The AppID URI serves as a unique identifier for an application within the Azure Active Directory (Azure AD) ecosystem. Changes to this URI could indicate that an attacker is attempting to impersonate a legitimate application or service, potentially bypassing security controls and gaining elevated access. Monitoring for these changes is crucial for defenders to identify and respond to potentially malicious activity.
Attack Chain
- An attacker gains initial access to an Azure account, possibly through compromised credentials or exploiting a vulnerability (T1078.004).
- The attacker enumerates available applications and service principals within the Azure environment.
- The attacker identifies a target application with a high-value AppID URI.
- The attacker modifies the AppID URI of the target application, potentially to impersonate another service or application (T1552).
- This change might be done to allow the attacker to request tokens for that application.
- The attacker leverages the modified AppID URI to request access tokens, potentially gaining unauthorized access to resources (T1078.004).
- The attacker uses the acquired access tokens to move laterally within the Azure environment and access sensitive data or systems.
- The attacker maintains persistence by using the modified application for continued unauthorized access.
Impact
Successful modification of an AppID URI can lead to significant security breaches, including unauthorized access to sensitive data, privilege escalation, and persistent compromise of the Azure environment. An attacker can impersonate legitimate applications, bypassing security controls and potentially affecting numerous resources and users. The scope of the impact depends on the permissions and access levels associated with the compromised application.
Recommendation
- Deploy the Sigma rule “Application AppID Uri Configuration Changes” to your SIEM to detect unauthorized modifications to AppID URIs (rule provided below).
- Investigate any alerts generated by the Sigma rule to determine the legitimacy of the AppID URI changes.
- Implement multi-factor authentication (MFA) for all Azure accounts to reduce the risk of credential compromise.
- Regularly review and audit application permissions and configurations to identify and remediate any misconfigurations.
- Monitor Azure audit logs for other suspicious activities related to application and service principal management.
Detection coverage 2
Azure AD Application AppID URI Update
highDetects when an AppID URI is updated for an Azure AD Application.
Azure AD Application AppID URI Added
mediumDetects when an AppID URI is added for an Azure AD Application.
Detection queries are kept inside the platform. Get full rules →