Azure Service Principal Sign-In Followed by Arc Cluster Credential Access
Detects a service principal authenticating to Azure AD followed by listing credentials for an Azure Arc-connected Kubernetes cluster, indicating potential adversary activity with stolen service principal secrets to establish a proxy tunnel into Kubernetes clusters.
This detection identifies a specific attack sequence targeting Azure Arc-connected Kubernetes clusters. It focuses on the scenario where a service principal authenticates to Microsoft Entra ID and subsequently requests credentials for an Azure Arc-connected Kubernetes cluster. The listClusterUserCredential action is used to retrieve tokens that enable kubectl access through the Arc Cluster Connect proxy. This sequence is particularly concerning when the service principal authenticates externally and immediately accesses Arc cluster credentials, especially from unexpected locations or Autonomous System Numbers (ASNs). This behavior, observed in attacks like those described by IBM X-Force in 2025, can lead to attackers gaining unauthorized access to and control over Kubernetes clusters. Defenders should investigate such events, particularly when the sign-in originates from an unexpected location or ASN.
Attack Chain
- Initial Compromise: An attacker gains unauthorized access to a service principal’s credentials (e.g., through credential stuffing, phishing, or exposed secrets).
- Service Principal Authentication: The attacker uses the compromised service principal credentials to authenticate to Microsoft Entra ID (Azure AD) using the
ServicePrincipalSignInLogs. - Credential Listing Request: Immediately following successful authentication, the attacker leverages the service principal to initiate a request to list the cluster user credentials for an Azure Arc-connected Kubernetes cluster, triggering the
MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/LISTCLUSTERUSERCREDENTIAL/ACTIONin the Activity Logs. - Credential Retrieval: The attacker retrieves the Arc cluster credentials.
- Proxy Tunnel Establishment: The attacker uses the retrieved credentials to establish a proxy tunnel into the Kubernetes cluster via the Arc Cluster Connect proxy.
- Kubernetes Access: With the tunnel established, the attacker can now execute kubectl commands, perform unauthorized actions within the cluster, such as creating, reading, updating, and deleting (CRUD) secrets and configmaps.
- Lateral Movement & Privilege Escalation: The attacker exploits vulnerabilities or misconfigurations within the Kubernetes cluster to move laterally to other resources, escalate privileges, and gain further control.
- Data Exfiltration or Ransomware Deployment: The attacker exfiltrates sensitive data from the Kubernetes cluster or deploys ransomware to encrypt critical data, impacting business operations.
Impact
Successful exploitation of this attack chain can lead to complete compromise of Azure Arc-connected Kubernetes clusters. Attackers can gain unauthorized access to sensitive data, disrupt critical services, and potentially deploy ransomware. The IBM X-Force team has documented cases of attackers using similar techniques for hybrid escalation and persistence. This can impact organizations across all sectors utilizing Azure Arc for managing Kubernetes clusters, potentially affecting dozens or hundreds of clusters per victim organization.
Recommendation
- Deploy the provided Sigma rules to your SIEM and tune for your environment to detect the sequence of service principal sign-in followed by Arc cluster credential access.
- Review Azure AD Audit Logs for recent changes to service principals, focusing on new credentials, federated identities, and owner changes, based on the investigation steps outlined in the rule’s note.
- Enable conditional access policies to restrict service principal authentication by location to prevent logins from unexpected regions, as suggested in the rule’s note.
- Monitor Azure Activity Logs for
MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/LISTCLUSTERUSERCREDENTIAL/ACTIONevents to identify potential unauthorized access attempts. - Rotate service principal credentials regularly and revoke active sessions and tokens for the SP as outlined in the rule’s response and remediation steps.
Detection coverage 2
Azure Arc - Service Principal Sign-in Followed by List Credentials
mediumDetects a service principal authenticating to Azure AD followed by a request to list credentials for an Azure Arc-connected Kubernetes cluster.
Azure - Successful Service Principal Sign-in
infoDetects successful service principal sign-ins to Azure.
Detection queries are kept inside the platform. Get full rules →