<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Azure Firewall — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/azure-firewall/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 31 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/azure-firewall/feed.xml" rel="self" type="application/rss+xml"/><item><title>Azure Firewall Rule Collection Modification or Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-rule-collection-modification/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-rule-collection-modification/</guid><description>An attacker may modify or delete Azure Firewall rule collections (Application, NAT, and Network) to impair defenses and potentially enable malicious traffic.</description><content:encoded><![CDATA[<p>The modification or deletion of Azure Firewall rule collections (Application, NAT, and Network) can indicate malicious activity within an Azure environment. Threat actors may target these rules to bypass security controls, allowing unauthorized network traffic, enabling data exfiltration, or facilitating lateral movement. Monitoring these changes is crucial for maintaining the integrity of network security policies and detecting potential breaches. This activity directly impacts an organization&rsquo;s ability to enforce its security posture, potentially exposing sensitive resources to unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Azure environment, potentially through compromised credentials or a vulnerability in an application.</li>
<li>The attacker enumerates existing Azure Firewall resources to identify rule collections (Application, NAT, and Network) that can be modified or deleted.</li>
<li>The attacker uses valid Azure credentials or exploits a misconfiguration to authenticate to the Azure Resource Manager API.</li>
<li>The attacker crafts a malicious request to modify the target rule collection, potentially altering allowed ports, IP addresses, or protocols.</li>
<li>Alternatively, the attacker crafts a request to delete an entire rule collection, effectively disabling its associated security controls.</li>
<li>The attacker sends the request to the Azure Resource Manager API, executing the change to the firewall configuration.</li>
<li>The modified or deleted rule collection now allows unauthorized traffic to bypass the firewall, potentially enabling lateral movement or data exfiltration.</li>
<li>The attacker exploits the newly opened network paths to achieve their final objective, such as deploying ransomware or accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or deletion of Azure Firewall rule collections can have significant consequences. Unauthorized traffic could bypass security controls, enabling data exfiltration, lateral movement, or the deployment of malware. This could lead to data breaches, service disruptions, and financial losses. The impact depends on the scope of the modified or deleted rule collection and the resources it protects.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Azure Firewall Rule Collection Modified or Deleted&rdquo; to your SIEM and tune for your environment to detect unauthorized changes to firewall configurations.</li>
<li>Review Azure Activity Logs for any events matching the <code>operationName</code> values specified in the Sigma rule to identify suspicious activity.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts, especially those with permissions to manage firewall resources, to reduce the risk of credential compromise.</li>
<li>Regularly audit Azure role-based access control (RBAC) assignments to ensure the principle of least privilege is followed and that only authorized users have permissions to modify firewall configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>firewall</category><category>defense-impairment</category></item></channel></rss>