<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AD FS — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/ad-fs/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 23 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/ad-fs/feed.xml" rel="self" type="application/rss+xml"/><item><title>Spoofing AD FS Signing Logs via Azure AD Hybrid Health Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-azuread-adfs-spoofing/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-azuread-adfs-spoofing/</guid><description>A threat actor can create a new, rogue AD Health ADFS service within Azure and then create a fake server instance, which can be leveraged to spoof AD FS signing logs without compromising on-prem AD FS servers.</description><content:encoded><![CDATA[<p>This threat involves the creation of a rogue AD FS service instance within the Azure AD Hybrid Health Service to spoof AD FS signing logs. The attacker leverages the Azure AD Hybrid Health Service to create a new AD FS service and adds a fake server instance. This method allows the attacker to manipulate AD FS logging information without needing to compromise an on-premises AD FS server. The attack can be performed programmatically through HTTP requests to Azure, making it scalable and difficult to trace back to traditional on-premises attack vectors. This technique is particularly concerning because it undermines the integrity of AD FS logs, a crucial component for security monitoring and incident response.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Compromise Azure Account:</strong> The attacker gains access to an Azure account, potentially through stolen credentials or exploiting a vulnerability.</li>
<li><strong>Provision Rogue AD Health Service:</strong> The attacker programmatically provisions a new AD Health Service within the compromised Azure environment, specifically targeting AD FS.</li>
<li><strong>Create Fake Server Instance:</strong> Within the newly created AD Health Service, the attacker creates a fake server instance, mimicking a legitimate AD FS server. The <code>ResourceId</code> will contain <code>AdFederationService</code>.</li>
<li><strong>Manipulate Logs:</strong> Using the fake server instance, the attacker injects or alters AD FS signing logs, creating a false narrative of user authentication events.</li>
<li><strong>Impersonate Users/Bypass Authentication:</strong> The attacker uses the manipulated logs to impersonate legitimate users or bypass authentication controls in applications relying on AD FS.</li>
<li><strong>Lateral Movement/Privilege Escalation:</strong> Using the falsely acquired credentials or authentication tokens, the attacker moves laterally within the network, escalating privileges to access sensitive resources.</li>
<li><strong>Data Exfiltration/System Compromise:</strong> The attacker exfiltrates sensitive data or gains control over critical systems using the compromised accounts and manipulated logs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to spoof AD FS signing logs, potentially leading to unauthorized access, data breaches, and system compromise. The compromised logs can be used to cover the attacker&rsquo;s tracks, making detection and incident response more difficult. Organizations relying on Azure AD Hybrid Health for AD FS monitoring are at risk of having their security posture undermined. The number of potential victims is substantial, as many organizations use AD FS for authentication and rely on its logs for security monitoring.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Azure Active Directory Hybrid Health AD FS New Server</code> to your SIEM to detect the creation of new AD FS server instances within the Azure AD Hybrid Health Service. Tune the rule for your environment to minimize false positives.</li>
<li>Monitor Azure Activity Logs for any unusual activity related to the <code>Microsoft.ADHybridHealthService</code> resource provider and the <code>Microsoft.ADHybridHealthService/services/servicemembers/action</code> operation, specifically the <code>Administrative</code> category.</li>
<li>Review and validate all AD FS server instances registered within the Azure AD Hybrid Health Service to ensure their legitimacy.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts to prevent unauthorized access and mitigate the risk of initial compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>azure</category><category>adfs</category><category>defense-impairment</category></item></channel></rss>