O365 MFA Bypassed via Trusted IP Addition
An attacker modifies trusted IP settings in Office 365 to bypass multi-factor authentication (MFA), potentially leading to unauthorized access and data compromise.
Attackers can weaken an organization’s security by adding new IP addresses to the trusted IPs list in Office 365. By manipulating the trusted IP configuration, attackers can bypass Multi-Factor Authentication (MFA), gaining unauthorized access to sensitive resources and systems. This technique circumvents a critical security control designed to protect against credential compromise. The activity is often performed after initial access has been gained through other means, such as phishing or credential stuffing. Defenders should monitor changes to trusted IP configurations and investigate any unauthorized modifications promptly. The references suggest this technique is used to maintain persistence in compromised cloud environments.
Attack Chain
- The attacker gains initial access to an account with sufficient privileges, possibly via credential compromise or phishing.
- The attacker authenticates to the Office 365 portal using the compromised credentials.
- The attacker navigates to the Azure Active Directory admin center.
- The attacker modifies the Conditional Access policies to add a new trusted IP range. This is achieved by setting the
StrongAuthenticationPolicyproperty. - The attacker sets the
ModifiedProperties{}.NametoStrongAuthenticationPolicywithin the O365 management activity logs. - The attacker ensures the
ModifiedProperties{}.NewValuecontains a new IP address range that allows bypass of MFA. - The attacker uses a device within the newly trusted IP range to authenticate to Office 365 services.
- MFA is bypassed, granting the attacker access to sensitive data and systems within the organization.
Impact
Successful exploitation of this technique can lead to significant damage. Attackers can gain unauthorized access to sensitive information, potentially leading to data breaches, financial losses, and reputational damage. By bypassing MFA, attackers can move laterally within the organization’s cloud environment, compromising additional accounts and resources. The number of affected users and the severity of the impact depend on the scope of access granted to the compromised account. Organizations in all sectors that rely on Office 365 are potentially vulnerable.
Recommendation
- Install the Splunk Microsoft Office 365 add-on to ingest the required logs, as mentioned in the “how_to_implement” section.
- Deploy the provided Sigma rule to detect suspicious modifications to trusted IP addresses in O365.
- Investigate any alerts generated by the Sigma rule, focusing on the user (
user) and IP address (ip_addresses_new_added) involved. - Review existing Conditional Access policies and trusted IP configurations to ensure they align with security best practices.
- Implement stricter monitoring and alerting for administrative accounts to detect unauthorized changes to security configurations.
Detection coverage 2
O365 Trusted IP Added to Bypass MFA
highDetects when new IP addresses are added to the trusted IPs list in Office 365, potentially allowing MFA bypass.
O365 MFA Bypass Trusted IP - Management Activity
highDetects addition of trusted IPs via O365 management activity logs
Detection queries are kept inside the platform. Get full rules →