<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Azure — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/azure/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 24 Apr 2026 09:09:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/azure/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-microsoft-cloud-vulns/</link><pubDate>Fri, 24 Apr 2026 09:09:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-microsoft-cloud-vulns/</guid><description>Multiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been reported affecting Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps. Successful exploitation of these vulnerabilities could enable attackers to perform a variety of malicious actions, including escalating their privileges within the affected systems, executing arbitrary code to gain further control, and conducting spoofing attacks to deceive users or bypass security measures. The full details regarding specific vulnerability types and exploitation methods are currently unavailable, but the breadth of affected products indicates a potentially widespread impact across cloud-based Microsoft services. Defenders should prioritize monitoring for suspicious activity indicative of exploitation attempts targeting these services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Since the advisory lacks specifics, we will describe a generalized attack chain based on the potential vulnerabilities:</p>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to a target environment, possibly through compromised credentials or a separate vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker exploits a vulnerability within one of the Microsoft cloud products (Azure, Microsoft 365 Copilot, Dynamics 365, or Power Apps) to elevate their privileges to a higher level, potentially gaining administrative rights.</li>
<li><strong>Code Injection:</strong> Leveraging the escalated privileges, the attacker injects malicious code into a vulnerable component of the cloud service.</li>
<li><strong>Code Execution:</strong> The injected code is executed, allowing the attacker to perform arbitrary actions within the context of the compromised service.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised service as a pivot point to move laterally within the cloud environment, targeting other resources and services.</li>
<li><strong>Data Exfiltration/Manipulation:</strong> Once established within the environment, the attacker exfiltrates sensitive data or manipulates data for malicious purposes.</li>
<li><strong>Spoofing Attacks:</strong> The attacker leverages the compromised environment to launch spoofing attacks, potentially targeting other users or systems with phishing emails or other deceptive tactics.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence within the cloud environment to maintain access even after the initial vulnerability is patched.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have significant consequences, including unauthorized access to sensitive data, disruption of critical business processes, and financial losses. The number of potential victims is substantial, given the widespread use of Microsoft cloud services across various sectors. A successful attack could result in data breaches, service outages, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor logs from Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps for suspicious activity indicative of privilege escalation, code execution, and spoofing attacks.</li>
<li>Enable and review audit logs within the affected Microsoft cloud services to identify anomalous user behavior and potential security breaches.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune them for your specific environment to detect potential exploitation attempts.</li>
<li>Follow Microsoft&rsquo;s official security advisories and apply any available patches or mitigations as soon as they are released.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>privilege-escalation</category><category>code-execution</category><category>spoofing</category></item><item><title>Azure Identity Protection Suspicious Browser Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-31-suspicious-azure-browser/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-31-suspicious-azure-browser/</guid><description>A suspicious browser activity alert indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser, potentially indicating compromised credentials or other malicious activity.</description><content:encoded><![CDATA[<p>The &ldquo;suspiciousBrowser&rdquo; risk event in Azure Identity Protection signals unusual sign-in patterns indicative of potential account compromise or other malicious activity. This alert is triggered when the same browser is used to access multiple tenants from different countries, which is an atypical behavior for legitimate users. This type of activity could be caused by malware, credential theft, or an attacker attempting to blend in with normal user behavior after gaining unauthorized access. This detection is important for defenders because it can highlight early stages of an attack, potentially preventing lateral movement, data exfiltration, or other damaging actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a user&rsquo;s credentials through phishing, malware, or other means (T1566, T1190).</li>
<li>The attacker configures a browser with the stolen credentials.</li>
<li>The attacker uses the same browser to attempt sign-ins to multiple Azure tenants from different geographical locations, attempting to blend in with typical user activity.</li>
<li>Azure Identity Protection detects the &ldquo;suspiciousBrowser&rdquo; risk event based on the anomalous sign-in activity.</li>
<li>If successful, the attacker may gain access to sensitive data and resources within the targeted tenants.</li>
<li>The attacker leverages the compromised accounts to escalate privileges and move laterally within the organization (T1078, T1068).</li>
<li>The attacker exfiltrates sensitive data or deploy ransomware (T1003, T1486).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack exploiting suspicious browser activity can lead to unauthorized access to multiple Azure tenants, potentially impacting numerous organizations. The compromise of user accounts can result in data breaches, financial losses, and reputational damage. The scope of the impact depends on the level of access granted to the compromised accounts and the sensitivity of the data stored within the targeted tenants.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect &ldquo;suspiciousBrowser&rdquo; risk events in your Azure environment and tune for your environment.</li>
<li>Investigate sessions flagged by this detection in the context of other sign-ins from the same user to identify false positives.</li>
<li>Enforce multi-factor authentication (MFA) to mitigate the impact of compromised credentials.</li>
<li>Monitor user sign-in activity for unusual patterns, such as sign-ins from multiple geographical locations within a short period.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>identity-protection</category><category>suspicious-browser</category></item><item><title>Azure Authentication Method Change Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-azure-auth-method-change/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-azure-auth-method-change/</guid><description>An attacker may add an authentication method to a compromised Azure account for persistent access, which can be detected by monitoring changes to authentication methods in Azure audit logs.</description><content:encoded><![CDATA[<p>Attackers often target cloud environments to establish persistence and maintain unauthorized access. One technique involves adding their own authentication methods to compromised user accounts. By registering a new security info, such as a phone number or email address, an attacker can bypass multi-factor authentication and regain access even if the original credentials are changed. This activity is typically logged within Azure Audit Logs, specifically under the &lsquo;Authentication Methods&rsquo; service and &lsquo;UserManagement&rsquo; category. Detecting these changes is crucial for identifying potentially compromised accounts and preventing further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the Azure environment is gained, potentially through credential phishing or other means.</li>
<li>The attacker identifies a target user account with sufficient privileges.</li>
<li>The attacker accesses the Azure Active Directory (Azure AD) settings for the compromised user.</li>
<li>The attacker navigates to the &ldquo;Security info&rdquo; section of the user&rsquo;s profile.</li>
<li>The attacker registers a new authentication method, such as a phone number or email address, controlled by the attacker. This action generates an audit log event with OperationName &ldquo;User registered security info&rdquo;.</li>
<li>The attacker can now use the newly added authentication method to bypass multi-factor authentication.</li>
<li>The attacker leverages the compromised account to access sensitive data, applications, or resources within the Azure environment.</li>
<li>The attacker maintains persistent access to the Azure environment, even if the original account password is changed.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful addition of rogue authentication methods allows attackers to maintain persistent access to compromised accounts within Azure environments. This can lead to data breaches, unauthorized access to sensitive applications, privilege escalation, and lateral movement within the cloud infrastructure. The impact can range from data exfiltration to complete control over the targeted Azure resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect changes to authentication methods within Azure audit logs (logsource: azure, service: auditlogs).</li>
<li>Investigate any instances where the <code>OperationName</code> is <code>User registered security info</code> in the Azure Audit Logs, as this indicates a change in authentication method.</li>
<li>Review the referenced Microsoft documentation on privileged account security to understand best practices for securing administrative accounts (references).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>persistence</category><category>privilege-escalation</category></item><item><title>Azure Privileged Identity Management (PIM) Invalid License Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-invalid-pim-license/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-invalid-pim-license/</guid><description>Detection of unauthorized access or privilege escalation attempts within Azure environments due to invalid or missing Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses for Privileged Identity Management (PIM).</description><content:encoded><![CDATA[<p>This alert identifies scenarios where an organization lacks the necessary Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses required for proper Privileged Identity Management (PIM) functionality. Attackers may attempt to exploit misconfigured or unlicensed PIM deployments to gain unauthorized privileged access to critical Azure resources. This detection is crucial as it indicates a compliance issue that can be leveraged to escalate privileges, bypass security controls, and potentially lead to data breaches or system compromise. The absence of appropriate licensing hinders the effectiveness of PIM controls, creating opportunities for malicious actors to operate undetected. Defenders need to ensure appropriate licenses are in place.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Azure environment lacking a valid Microsoft Entra Premium P2 or Microsoft Entra ID Governance license for Privileged Identity Management (PIM).</li>
<li>The attacker attempts to activate a privileged role within the Azure environment through PIM.</li>
<li>Due to the invalid license, the PIM activation process may not enforce proper multi-factor authentication (MFA) or approval workflows.</li>
<li>The attacker gains unauthorized access to the privileged role without proper authorization or auditing.</li>
<li>The attacker leverages the compromised privileged role to access sensitive Azure resources, such as virtual machines, databases, or storage accounts.</li>
<li>The attacker performs malicious actions, such as data exfiltration, modification of system configurations, or deployment of malware.</li>
<li>The attacker attempts to establish persistence within the Azure environment by creating rogue user accounts or modifying existing access controls.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of an invalid PIM license can be severe. Organizations may experience unauthorized access to critical Azure resources, leading to data breaches, system compromise, and compliance violations. The absence of proper PIM controls can enable attackers to escalate privileges, bypass security measures, and operate undetected within the Azure environment. Identifying invalid PIM licenses is crucial for maintaining the security and integrity of Azure deployments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>invalidLicenseAlertIncident</code> events in Azure PIM logs (logsource: azure, service: pim).</li>
<li>Investigate any detected instances of <code>invalidLicenseAlertIncident</code> to determine the scope of the issue and potential unauthorized access.</li>
<li>Verify that all Azure subscriptions utilizing PIM have valid Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses.</li>
<li>Implement automated monitoring to proactively identify and alert on invalid PIM licenses.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>privileged-identity-management</category><category>invalid-license</category></item><item><title>Azure Firewall Modification or Deletion Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-modified-or-deleted/</link><pubDate>Wed, 03 Jan 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-modified-or-deleted/</guid><description>An Azure firewall was created, modified, or deleted, potentially indicating malicious activity aimed at impairing network defenses.</description><content:encoded><![CDATA[<p>This alert identifies potentially malicious modifications or deletions of Azure firewalls. Azure firewalls are critical components for network security, controlling inbound and outbound traffic based on defined rules. An attacker who gains sufficient privileges within an Azure environment may attempt to disable or modify these firewalls to facilitate lateral movement, data exfiltration, or other malicious activities. This activity is particularly concerning as it represents a direct attempt to weaken the victim&rsquo;s security posture. The activity is detected via Azure Activity Logs. While legitimate administrative actions can trigger this alert, any unexpected or unauthorized changes to firewall configurations should be investigated promptly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to an Azure environment, possibly through compromised credentials or exploiting a vulnerability in an application.</li>
<li>Attacker escalates privileges within the Azure subscription to gain permissions to manage network resources, including firewalls.</li>
<li>Attacker identifies the Azure firewalls in the target environment using Azure Resource Manager APIs or the Azure portal.</li>
<li>Attacker modifies firewall rules to allow unauthorized traffic, such as opening ports for command and control communication or disabling security rules. This is achieved via the <code>MICROSOFT.NETWORK/AZUREFIREWALLS/WRITE</code> operation.</li>
<li>Alternatively, the attacker deletes the Azure firewall using the <code>MICROSOFT.NETWORK/AZUREFIREWALLS/DELETE</code> operation, effectively removing network protections.</li>
<li>Attacker validates that their changes have been successfully applied by testing network connectivity or by reviewing the firewall configuration.</li>
<li>Attacker performs malicious activities such as lateral movement, data exfiltration, or deploying additional resources without firewall restrictions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or deletion of Azure firewalls can have severe consequences. An attacker can bypass network security controls, leading to data breaches, unauthorized access to sensitive resources, and the potential for widespread disruption. This can result in financial losses, reputational damage, and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized firewall modifications or deletions in Azure Activity Logs.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on unfamiliar user identities and user agents.</li>
<li>Review Azure RBAC roles and permissions to ensure the principle of least privilege is enforced, limiting the ability of users and service principals to modify or delete firewalls.</li>
<li>Monitor Azure Activity Logs for other suspicious activities, such as unusual resource deployments or changes to security settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>firewall</category><category>defense-evasion</category></item><item><title>Azure PIM Elevation Approved or Denied</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-elevation/</link><pubDate>Wed, 03 Jan 2024 18:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-elevation/</guid><description>Detection of Azure Privileged Identity Management (PIM) elevation approvals or denials, which, if unexpected, may indicate unauthorized privilege escalation or malicious activity within an Azure environment.</description><content:encoded><![CDATA[<p>The compromise of privileged accounts within cloud environments is a significant risk. Azure Privileged Identity Management (PIM) is designed to mitigate this risk by enforcing time-bound and approval-based role activation. This brief focuses on the detection of PIM elevation requests that are either approved or denied. While legitimate administrator actions will trigger these events, unexpected or unauthorized approvals/denials, especially those occurring outside of normal business hours or originating from unusual locations, warrant immediate investigation. This activity can indicate attempts at unauthorized privilege escalation, lateral movement, or data exfiltration within the Azure environment. Monitoring these events provides an opportunity to identify and respond to potential breaches before significant damage can occur.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a low-privileged Azure account, possibly through credential phishing or password reuse.</li>
<li>The attacker attempts to activate a privileged role (e.g., Global Administrator, Security Administrator) through Azure PIM.</li>
<li>The PIM request triggers an approval workflow, requiring authorization from designated approvers.</li>
<li>An attacker compromises an approver account, enabling them to approve their own malicious PIM request or deny a legitimate one.</li>
<li>Alternatively, an unwitting approver approves a malicious request, potentially due to social engineering.</li>
<li>Upon approval, the attacker&rsquo;s account is temporarily elevated to the requested privileged role.</li>
<li>The attacker leverages the elevated privileges to perform malicious actions, such as creating new accounts, modifying security policies, or accessing sensitive data.</li>
<li>The attacker attempts to maintain persistence by creating backdoor accounts or modifying access controls, potentially circumventing PIM restrictions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to full control over the Azure environment, potentially impacting hundreds or thousands of users and services. A compromised Global Administrator role grants the attacker the ability to access and modify all resources within the Azure tenant, leading to data breaches, service disruptions, and financial losses. The targeted sectors include any organization leveraging Azure PIM for privileged access management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Azure PIM Elevation Approved or Denied</code> to your SIEM to detect unusual PIM activity.</li>
<li>Investigate any PIM approval or denial events occurring outside of normal business hours or originating from unexpected locations, focusing on the <code>properties.message</code> field in the logs.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts, especially those with approval permissions for PIM requests.</li>
<li>Regularly review and audit PIM role assignments and approval workflows to ensure they align with the principle of least privilege.</li>
<li>Enable alerting on changes to PIM policies and configurations to detect any unauthorized modifications.</li>
<li>Monitor Azure Audit Logs for suspicious activity following PIM role activation, looking for actions associated with common attack techniques (e.g., account creation, policy modification).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Azure PIM Role Activation Without MFA</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-no-mfa/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-no-mfa/</guid><description>Detection of Azure Privileged Identity Management (PIM) roles being activated without requiring multi-factor authentication, potentially leading to unauthorized privilege escalation and persistence.</description><content:encoded><![CDATA[<p>The absence of multi-factor authentication (MFA) during the activation of privileged roles in Azure Privileged Identity Management (PIM) poses a significant security risk. When roles can be activated without MFA, attackers who have already compromised a user account can escalate their privileges without needing to bypass an MFA challenge. This scenario circumvents a critical security control, making the environment vulnerable to lateral movement, data exfiltration, and other malicious activities. This brief is based on Sigma rule 94a66f46-5b64-46ce-80b2-75dcbe627cc0, published on 2023-09-14. Defenders need to monitor PIM configurations to ensure that MFA is enforced for all privileged role activations, mitigating the risk of unauthorized access and privilege escalation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a user account, potentially through phishing or credential stuffing.</li>
<li>The attacker identifies a privileged role within Azure PIM that the compromised user is eligible to activate.</li>
<li>The attacker attempts to activate the privileged role using the compromised user&rsquo;s credentials.</li>
<li>Due to misconfiguration, MFA is not required for the role activation process.</li>
<li>The attacker successfully activates the privileged role without providing a second factor of authentication.</li>
<li>The attacker leverages the newly acquired privileges to access sensitive resources and data within the Azure environment.</li>
<li>The attacker performs malicious actions such as creating new accounts, modifying configurations, or exfiltrating data.</li>
<li>The attacker establishes persistence by creating backdoors or modifying access control policies.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The absence of MFA during PIM role activation can lead to significant damage, potentially affecting all resources within the Azure environment accessible to the compromised privileged role. Successful exploitation allows attackers to bypass a critical security control, leading to privilege escalation, data breaches, and system compromise. The impact spans data confidentiality, integrity, and availability, and could result in regulatory fines, reputational damage, and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Roles Activation Doesn&rsquo;t Require MFA&rdquo; to your SIEM and tune for your environment to detect instances where privileged roles are activated without MFA based on <code>riskEventType: 'noMfaOnRoleActivationAlertIncident'</code> in Azure PIM logs.</li>
<li>Review and enforce MFA policies for all privileged role activations within Azure PIM, as recommended in the Microsoft documentation (<a href="https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#roles-dont-require-multi-factor-authentication-for-activation">https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#roles-dont-require-multi-factor-authentication-for-activation</a>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>mfa</category><category>privilege-escalation</category></item><item><title>Detection of Azure Application Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-app-deletion/</link><pubDate>Wed, 03 Jan 2024 15:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-app-deletion/</guid><description>This alert identifies when an application is deleted within an Azure environment, which could indicate malicious activity or unintended misconfiguration leading to service disruption.</description><content:encoded><![CDATA[<p>This detection focuses on identifying instances where an application is deleted within an Azure environment. While legitimate application deletions occur as part of IT administration, malicious actors might delete applications to disrupt services, remove evidence of their presence, or prepare for a larger attack by removing security controls or access points. This activity is logged within Azure Activity Logs and includes events such as &ldquo;Delete application&rdquo; and &ldquo;Hard Delete application&rdquo;. Monitoring these events can provide early warning of potential security incidents or compliance violations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to an Azure account, potentially through compromised credentials or exploiting a vulnerability in an application.</li>
<li><strong>Privilege Escalation (Optional):</strong> The attacker escalates their privileges within the Azure environment to gain sufficient permissions to manage and delete applications.</li>
<li><strong>Reconnaissance:</strong> The attacker identifies target applications for deletion, potentially those critical for business operations or those used for security controls.</li>
<li><strong>Disable Monitoring (Optional):</strong> The attacker attempts to disable logging or monitoring related to application management to avoid detection.</li>
<li><strong>Application Deletion:</strong> The attacker initiates the deletion of the targeted application using the Azure portal, Azure CLI, or PowerShell.</li>
<li><strong>Confirmation/Hard Delete:</strong> Depending on the application&rsquo;s configuration and Azure policies, the attacker may need to confirm the deletion or perform a &ldquo;hard delete&rdquo; to permanently remove the application.</li>
<li><strong>Cover Tracks:</strong> The attacker attempts to remove any remaining logs or traces of their activity to hinder forensic investigation.</li>
<li><strong>Impact:</strong> Service disruption or data loss due to the deleted application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deletion of an Azure application can lead to significant service disruption, data loss, and potential financial damages. The impact depends on the criticality of the deleted application and the organization&rsquo;s disaster recovery capabilities. Successful deletion can interrupt business processes, impacting both internal users and external customers. It may also lead to reputational damage and compliance violations if the application handled sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect application deletion events in Azure Activity Logs.</li>
<li>Review user roles and permissions in Azure Active Directory (Entra ID) and enforce the principle of least privilege.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with administrative privileges.</li>
<li>Enable auditing and logging for all Azure resources, including application management activities.</li>
<li>Investigate any detected application deletion events promptly to determine the root cause and potential impact.</li>
<li>Establish a process for reviewing and approving application deletion requests to prevent accidental or malicious deletions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>application</category><category>deletion</category><category>impact</category><category>t1489</category></item><item><title>Detection of Azure Subscription Permission Elevation</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-privilege-elevation/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-privilege-elevation/</guid><description>Detection of a user being assigned the 'User Access Administrator' role, which grants the ability to manage all Azure Subscriptions, potentially leading to privilege escalation and unauthorized access.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unauthorized elevation of privileges within Azure environments. Specifically, it addresses the assignment of the &lsquo;User Access Administrator&rsquo; role to a user, which allows managing access to all Azure subscriptions. This activity can be indicative of malicious actors attempting to gain control over an Azure environment or an insider threat escalating their privileges without proper authorization. The detection is based on Azure Audit Logs and can help identify potentially compromised accounts or misconfigurations. A successful elevation can lead to unauthorized access, data breaches, and service disruptions. Defenders should closely monitor these events and investigate any unexpected privilege escalations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure account, possibly through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker attempts to assign the &lsquo;User Access Administrator&rsquo; role to themselves or another account they control.</li>
<li>This assignment generates an &lsquo;Administrative&rsquo; audit log event with the OperationName &lsquo;Assigns the caller to user access admin&rsquo;.</li>
<li>The attacker now has the ability to manage user access to all Azure subscriptions within the tenant.</li>
<li>The attacker creates new user accounts with elevated privileges within the subscriptions.</li>
<li>The attacker leverages the newly created accounts to access sensitive resources and data.</li>
<li>The attacker performs reconnaissance activities to identify critical assets and data stores.</li>
<li>The attacker exfiltrates sensitive data or deploys malicious workloads within the compromised subscriptions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation to the &lsquo;User Access Administrator&rsquo; role can have severe consequences. It grants the attacker complete control over the Azure subscriptions, allowing them to access sensitive data, disrupt services, and potentially compromise the entire cloud environment. The number of affected subscriptions depends on the scope of the compromised account. This attack targets any organization utilizing Azure subscriptions and is particularly impactful for those storing sensitive data or running critical applications in the cloud.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule &ldquo;Azure Subscription Permission Elevation Via AuditLogs&rdquo; to your SIEM and tune it for your environment to detect the &lsquo;Assigns the caller to user access admin&rsquo; event in the Azure Audit Logs.</li>
<li>Investigate any detected instances of this event to determine if the privilege elevation was authorized and legitimate.</li>
<li>Review and enforce the principle of least privilege for all Azure accounts to minimize the impact of potential compromises; reference the Microsoft Entra documentation for guidance.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with administrative privileges, to prevent unauthorized access via compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.privilege-escalation</category><category>attack.persistence</category><category>attack.initial-access</category><category>attack.stealth</category><category>attack.t1078</category></item><item><title>Excessive Global Administrator Accounts in Azure PIM</title><link>https://feed.craftedsignal.io/briefs/2024-01-too-many-global-admins/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-too-many-global-admins/</guid><description>Detection of an excessive number of Global Administrator accounts assigned within an Azure tenant, indicating potential privilege escalation or compromised accounts.</description><content:encoded><![CDATA[<p>The presence of an excessive number of Global Administrator accounts in an Azure tenant poses a significant security risk. While the source does not attribute this activity to a specific threat actor, the risk event indicates a potential compromise of existing accounts, internal privilege abuse, or misconfiguration within the Azure environment. The alert triggers when the number of Global Administrator assignments exceeds a predefined threshold within Privileged Identity Management (PIM). Attackers may abuse highly privileged accounts to gain broad control over the Azure environment, deploy malicious workloads, exfiltrate data, or establish persistence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker compromises a low-privilege user account through phishing or credential stuffing.</li>
<li><strong>Privilege Escalation:</strong> The attacker attempts to elevate privileges by exploiting misconfigured permissions or vulnerabilities within the Azure environment.</li>
<li><strong>Global Admin Role Assignment:</strong> The attacker assigns the Global Administrator role to multiple accounts, including the compromised account, either directly or through PIM bypass.</li>
<li><strong>Lateral Movement:</strong> With Global Administrator privileges, the attacker moves laterally within the Azure environment, accessing sensitive resources and data.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrates sensitive data from cloud storage, databases, or virtual machines.</li>
<li><strong>Persistence:</strong> The attacker establishes persistent access by creating backdoors, modifying access controls, or deploying rogue applications.</li>
<li><strong>Covering Tracks:</strong> The attacker attempts to remove audit logs or disable security features to hide their activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of Global Administrator accounts can lead to significant damage, including data breaches, financial loss, and reputational damage. Excessive admin accounts significantly widen the attack surface and increase the likelihood of successful attacks. The impact includes unauthorized access to sensitive data, disruption of business operations, and potential regulatory fines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Too Many Global Admins&rdquo; to your SIEM and tune the threshold for your environment to detect excessive Global Administrator assignments in Azure PIM.</li>
<li>Review and reduce the number of Global Administrator accounts to the minimum necessary.</li>
<li>Implement multi-factor authentication (MFA) for all privileged accounts.</li>
<li>Monitor Azure audit logs for suspicious activity related to role assignments and privilege elevation.</li>
<li>Regularly review and update PIM policies to ensure appropriate access controls.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>global_admin</category><category>privilege_escalation</category></item><item><title>Detection of Azure Service Principal Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-sp-creation/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-sp-creation/</guid><description>Detects the creation of a service principal in Azure, which could indicate potential attacker activity for lateral movement or persistence.</description><content:encoded><![CDATA[<p>The creation of service principals in Azure can be a legitimate administrative task, but it can also be an indicator of malicious activity. Attackers may create service principals to establish persistence, move laterally within the Azure environment, or gain unauthorized access to resources. This activity is particularly concerning when performed by unfamiliar users or from unusual locations. Monitoring for unexpected service principal creation is crucial for detecting potential security breaches in Azure environments. This alert focuses on detecting the &ldquo;Add service principal&rdquo; message within Azure Activity Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure account, possibly through compromised credentials or a vulnerable application.</li>
<li>The attacker authenticates to the Azure portal or uses Azure CLI with the compromised credentials.</li>
<li>The attacker executes commands to create a new service principal using tools like Azure CLI or PowerShell.</li>
<li>Azure Activity Logs record the &ldquo;Add service principal&rdquo; event.</li>
<li>The attacker assigns roles and permissions to the newly created service principal, granting it access to specific resources.</li>
<li>The attacker leverages the service principal for lateral movement, accessing resources or services within the Azure environment.</li>
<li>The service principal is used for persistence, allowing the attacker to maintain access even if the initial access method is revoked.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful creation and misuse of a service principal can lead to unauthorized access to sensitive data, resources, and services within the Azure environment. The impact can range from data breaches and service disruption to complete control over the Azure subscription, potentially affecting hundreds or thousands of resources and users. The attacker can leverage the compromised service principal to perform actions with the permissions assigned to it, leading to significant damage and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Azure Service Principal Created&rdquo; to your SIEM and tune for your environment to detect suspicious service principal creations.</li>
<li>Investigate any alerts generated by the &ldquo;Azure Service Principal Created&rdquo; rule (logsource: azure) by verifying the user identity, user agent, and hostname associated with the event.</li>
<li>Review and audit existing service principals and their assigned permissions to identify any anomalies or overly permissive configurations.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts to reduce the risk of credential compromise and unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>cloud</category><category>service principal</category><category>persistence</category><category>lateral movement</category></item><item><title>Azure Service Principal Removal Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-service-principal-removed/</link><pubDate>Wed, 03 Jan 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-service-principal-removed/</guid><description>Detection of a service principal removal in Azure, potentially indicating malicious activity or an attempt to remove evidence of a compromise.</description><content:encoded><![CDATA[<p>The removal of a service principal within an Azure environment can be indicative of various activities, ranging from legitimate administrative tasks to malicious actions undertaken by threat actors attempting to cover their tracks. While service principals are routinely removed as part of lifecycle management, unauthorized or unexpected removals should be investigated promptly. This detection focuses on identifying such removals through Azure Activity Logs, allowing security teams to quickly respond to potentially suspicious events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains unauthorized access to an Azure account through compromised credentials or other means.</li>
<li>The attacker identifies a service principal used for malicious purposes or to maintain persistence.</li>
<li>The attacker attempts to remove the service principal to evade detection or disrupt incident response efforts.</li>
<li>The attacker executes the necessary commands or uses the Azure portal to initiate the service principal removal. This action is logged in the Azure Activity Logs.</li>
<li>The Azure Activity Logs record an event with the message &ldquo;Remove service principal&rdquo;.</li>
<li>The detection rule triggers based on the &ldquo;Remove service principal&rdquo; message in the Azure Activity Logs.</li>
<li>Security analysts investigate the event, examining the user identity, user agent, and hostname associated with the removal.</li>
<li>If the removal is deemed unauthorized or suspicious, further incident response procedures are initiated.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful removal of a service principal by a malicious actor can disrupt legitimate applications relying on that principal for authentication and authorization. It can also hinder incident response efforts by eliminating a potential avenue for investigation or remediation. The impact can range from service disruptions to prolonged breaches if the attacker successfully covers their tracks. The number of affected applications and the severity of the disruption depend on the role and permissions associated with the removed service principal.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Azure Service Principal Removed&rdquo; to your SIEM and tune for your environment, focusing on identifying legitimate administrator activity to reduce false positives.</li>
<li>Investigate any detected instance of service principal removal, focusing on the user identity, user agent, and hostname from the Azure Activity Logs to determine legitimacy.</li>
<li>Review Azure AD audit logs for related activities occurring before and after the service principal removal.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>service principal</category><category>stealth</category><category>cloud</category></item><item><title>Unused Privileged Identity Management (PIM) Roles in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-not-used/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-not-used/</guid><description>Detection of assigned but unused privileged roles in Azure's Privileged Identity Management (PIM) service, indicating potential misconfiguration, license overuse, or dormant privileged access that could be exploited.</description><content:encoded><![CDATA[<p>This alert identifies a condition where users have been assigned privileged roles within Azure&rsquo;s Privileged Identity Management (PIM) but are not actively utilizing those roles. This situation can arise from various factors, including misconfiguration of PIM settings, over-allocation of privileged roles due to process gaps or lack of oversight, or the presence of dormant accounts with elevated privileges. Such unused roles represent a potential security risk, as they can be exploited by malicious actors or misused inadvertently, especially if MFA or conditional access policies are not enforced. Regularly auditing and addressing unused PIM roles is crucial for maintaining a strong security posture and optimizing license utilization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An administrator assigns a privileged role to a user within Azure PIM.</li>
<li>The user is granted the role but does not activate or use it to perform any privileged actions.</li>
<li>Azure PIM monitors role usage and detects the lack of activity for the assigned role.</li>
<li>The &ldquo;redundantAssignmentAlertIncident&rdquo; event is triggered within the Azure PIM logs.</li>
<li>An attacker gains access to the user&rsquo;s account through credential compromise or other means.</li>
<li>The attacker activates the unused privileged role.</li>
<li>The attacker leverages the now-active privileged role to perform unauthorized actions, such as modifying system configurations, accessing sensitive data, or escalating privileges further.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise, without being detected due to the pre-existing role assignment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The presence of unused privileged roles can lead to significant security breaches and compliance violations. An attacker exploiting an unused role can gain immediate access to sensitive resources and perform unauthorized actions, potentially leading to data breaches, system outages, or financial losses. The number of affected users and resources depends on the scope of the unused role and the attacker&rsquo;s objectives. Failure to identify and address these unused roles can also result in unnecessary license costs and increased attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>redundantAssignmentAlertIncident</code> events indicating unused PIM roles in Azure (see &ldquo;Roles Are Not Being Used&rdquo; rule).</li>
<li>Investigate all detected instances of unused PIM roles to determine the reason for inactivity and potential risks.</li>
<li>Revoke the assigned role if the user no longer requires it, or provide training and guidance to ensure proper role utilization.</li>
<li>Review and refine PIM role assignment policies to minimize the allocation of unnecessary privileges.</li>
<li>Implement regular audits of PIM role assignments to identify and address unused roles promptly.</li>
<li>Configure security alerts within Azure PIM to receive notifications about unused roles and other potential security incidents.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>privileged-identity-management</category><category>role-based-access-control</category><category>initial-access</category><category>privilege-escalation</category></item><item><title>Unauthorized Guest User Invitation Attempt in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-guest-invite-failure/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-guest-invite-failure/</guid><description>Detection of a failed attempt to invite an external guest user by an Azure user lacking the necessary permissions, potentially indicating privilege escalation or malicious insider activity.</description><content:encoded><![CDATA[<p>This alert detects instances where a user attempts to invite an external guest user to an Azure environment but fails due to insufficient permissions. This activity can signify several potential security risks, including unauthorized privilege escalation attempts by internal users or malicious insiders attempting to expand access without proper authorization. While legitimate failed attempts may occur, repeated or targeted failures should be investigated. The activity is logged within the Azure Audit Logs. Detecting this activity is crucial for maintaining control over user access and preventing potential data breaches. The relevant log data resides within Azure&rsquo;s audit logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An internal user (either compromised or malicious) attempts to invite an external guest user via the Azure portal or API.</li>
<li>The Azure Active Directory service checks the inviter&rsquo;s permissions against the organization&rsquo;s guest invitation policies.</li>
<li>The system determines the user lacks the necessary permissions to invite guest users.</li>
<li>Azure Audit Logs record the &ldquo;Invite external user&rdquo; event with a &ldquo;failure&rdquo; status.</li>
<li>The failed invitation attempt is blocked, preventing the external user from gaining access.</li>
<li>The attacker may retry the invitation with different accounts or methods, attempting to bypass access controls.</li>
<li>If successful through other means (not detected by this rule), the guest user could be used for lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation could grant unauthorized access to sensitive data and resources within the Azure environment. While this specific detection focuses on failed attempts, repeated failures may indicate a concerted effort to bypass security controls. If successful, unauthorized guest users could be used for lateral movement, data exfiltration, or other malicious activities. The number of affected resources depends on the permissions granted to the guest user if the invitation had been successful.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Guest User Invited By Non Approved Inviters&rdquo; to your SIEM to detect unauthorized invitation attempts within Azure Audit Logs.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the invitation attempt and the intent of the user.</li>
<li>Review and enforce the principle of least privilege for user roles and permissions within Azure Active Directory.</li>
<li>Monitor for repeated failed invitation attempts from the same user account (correlate with the Azure Audit Logs data).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>initial-access</category><category>persistence</category><category>stealth</category><category>azure</category></item><item><title>Suspicious Process Accessing Sensitive Identity Files via Auditd</title><link>https://feed.craftedsignal.io/briefs/2024-01-sensitive-identity-file-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sensitive-identity-file-access/</guid><description>This rule detects suspicious processes, such as copy utilities or scripting tools, accessing sensitive identity files on Linux systems, including Kubernetes tokens, cloud CLI configurations, and root SSH keys, indicating potential credential theft.</description><content:encoded><![CDATA[<p>This detection focuses on identifying unauthorized access to sensitive identity files on Linux systems. It leverages Auditd to monitor file access events and flags processes that are commonly used for copying, scripting, or staging files from temporary directories. The targeted files include Kubernetes service account tokens, kubelet configurations, cloud CLI configurations for AWS, Azure, and Google Cloud, root SSH keys, and Docker configurations. These files are critical for authentication and authorization within the system, and unauthorized access could lead to credential theft, privilege escalation, or lateral movement. This is especially important in cloud environments and containerized deployments where these files are commonly used for managing access to resources. The rule is designed to exclude user home paths to avoid false positives and focus on system-level access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system through various means, such as exploiting a vulnerability or compromising credentials.</li>
<li>The attacker uses a utility like <code>cp</code>, <code>cat</code>, or <code>curl</code> to access sensitive files such as <code>/var/run/secrets/kubernetes.io/serviceaccount/token</code> or <code>/root/.ssh/id_rsa</code>.</li>
<li>Auditd logs the file access event, capturing details about the process, user, and file path.</li>
<li>The detection rule identifies the suspicious process based on its name, executable path (e.g., <code>/tmp/*</code>), or command-line arguments.</li>
<li>The rule checks if the accessed file is in the list of sensitive identity files.</li>
<li>If both conditions are met, the rule triggers an alert, indicating potential unauthorized access to sensitive credentials.</li>
<li>The attacker exfiltrates the stolen credentials or uses them to move laterally within the network.</li>
<li>The attacker uses the stolen credentials to access cloud resources or other sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of sensitive credentials, allowing attackers to gain unauthorized access to critical systems and data. This can result in data breaches, service disruptions, and financial losses. The targeted files contain credentials for Kubernetes clusters, cloud environments (AWS, Azure, Google Cloud), and SSH keys, potentially impacting a wide range of resources. The impact is particularly severe in environments where these credentials are used for managing critical infrastructure or accessing sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Auditd Manager integration with the specified audit rules in the provided setup steps to monitor access to sensitive identity files on Linux systems. Ensure auditd is properly configured and running (<code>auditctl -l</code>) to generate the necessary logs.</li>
<li>Deploy the Sigma rules provided to detect suspicious processes accessing sensitive identity files and tune them for your environment by excluding legitimate processes or users as needed.</li>
<li>Investigate alerts generated by the Sigma rules, focusing on the process name, executable, parent command line, and the accessed file path to determine the legitimacy of the access.</li>
<li>Review and harden file permissions on shared credential stores to prevent unauthorized access. Rotate exposed keys and tokens and invalidate cloud sessions if a compromise is suspected, as suggested in the rule&rsquo;s documentation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>linux</category><category>auditd</category></item><item><title>Privileged Identity Management (PIM) Alerting Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-pim-alerts-disabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-pim-alerts-disabled/</guid><description>An adversary disables Privileged Identity Management (PIM) alerts in Azure to evade detection and maintain persistent access with escalated privileges.</description><content:encoded><![CDATA[<p>Attackers may disable PIM alerts within Azure environments to weaken security monitoring and maintain a low profile while escalating privileges. This involves modifying alert settings within the Azure Privileged Identity Management service to prevent notifications of suspicious or unauthorized activity. This technique enables attackers to operate with reduced scrutiny, making it easier to establish persistence and move laterally within the compromised environment. Successful disabling of PIM alerts allows malicious actors to abuse privileged roles without triggering immediate alarms. This allows for potentially long-term access and control over critical resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to an Azure account, potentially through compromised credentials or exploiting a vulnerability.</li>
<li>Privilege Escalation: The attacker attempts to escalate privileges within the Azure Active Directory, potentially by exploiting misconfigured roles or vulnerabilities.</li>
<li>PIM Access: The attacker accesses the Azure Privileged Identity Management (PIM) service.</li>
<li>Alert Configuration Discovery: The attacker enumerates existing PIM alert configurations to identify the alerts to be disabled.</li>
<li>Alert Modification: The attacker modifies the alert settings, setting them to disabled. This is often done through the Azure portal or via API calls.</li>
<li>Persistence: With alerts disabled, the attacker can maintain persistence by assigning themselves privileged roles without generating notifications.</li>
<li>Lateral Movement: The attacker leverages the newly acquired privileged roles to move laterally within the Azure environment, accessing sensitive resources and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling PIM alerts significantly reduces an organization&rsquo;s visibility into privileged access activities. This can lead to delayed detection of malicious activities, enabling attackers to maintain a persistent presence, escalate privileges, and exfiltrate sensitive data without triggering alarms. The impact includes potential data breaches, financial losses, and reputational damage. The lack of alerts hinders incident response efforts and prolongs the duration of the attack, compounding the damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect instances where PIM alerts are disabled by monitoring <code>auditlogs</code> for <code>properties.message: Disable PIM Alert</code>.</li>
<li>Regularly review PIM alert configurations to ensure critical alerts are enabled and properly configured.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with administrative privileges, to mitigate initial access (T1078).</li>
<li>Enforce the principle of least privilege to limit the scope of potential damage from compromised accounts.</li>
<li>Monitor Azure audit logs for unusual activity related to PIM configuration changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>alerts</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Frequent Azure PIM Role Activation Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-activation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-activation/</guid><description>Detection of frequent role activation in Azure Privileged Identity Management (PIM) by the same user may indicate potential privilege escalation or account compromise.</description><content:encoded><![CDATA[<p>This threat brief addresses suspicious activity within Azure Privileged Identity Management (PIM), specifically the repeated activation of privileged roles by the same user. The alert, triggered by &lsquo;sequentialActivationRenewalsAlertIncident&rsquo; events, suggests that an attacker may be attempting to escalate privileges or maintain persistent access to sensitive resources. This activity can be indicative of compromised credentials or malicious insider activity. The detection is based on Azure PIM logs and aims to identify deviations from normal user behavior related to role activation. Defenders should investigate these alerts promptly to determine the legitimacy of the role activations and mitigate potential risks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to an Azure account, possibly through compromised credentials (T1078).</li>
<li>Privilege Discovery: The attacker identifies available privileged roles within Azure PIM.</li>
<li>Role Activation Request: The attacker initiates a request to activate a privileged role.</li>
<li>Role Activation: The attacker successfully activates the privileged role.</li>
<li>Resource Access: With the activated role, the attacker accesses sensitive resources or performs privileged actions.</li>
<li>Repeated Activation: The attacker deactivates and reactivates the same role shortly after, potentially to bypass monitoring or maintain persistent access.</li>
<li>Lateral Movement (Optional): The attacker uses the elevated privileges to move laterally within the Azure environment.</li>
<li>Data Exfiltration or System Damage (Impact): The attacker achieves their ultimate objective, such as exfiltrating sensitive data or causing damage to systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to unauthorized access to critical resources, data breaches, and significant damage to the organization&rsquo;s Azure environment. The repeated activation of privileged roles can be used to bypass security controls and maintain persistent access, making it difficult to detect malicious activity. A single compromised account with PIM access can lead to widespread impact across the entire Azure infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Roles Activated Too Frequently&rdquo; to your SIEM and tune it based on your environment to reduce false positives (logsource: azure, service: pim).</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Roles Activated Too Frequently&rdquo;, focusing on the context of the role activated and the user involved.</li>
<li>Review the active time period for roles in PIM to ensure they are not set too short, which can lead to frequent legitimate activations and false positives, as noted in the <code>falsepositives</code> section.</li>
<li>Implement multi-factor authentication (MFA) for all users, especially those with privileged roles, to mitigate the risk of credential compromise (T1078).</li>
<li>Monitor Azure Active Directory sign-in logs for suspicious activity, such as logins from unusual locations or devices.</li>
<li>Implement least privilege principles and regularly review role assignments to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>role-activation</category><category>privilege-escalation</category></item><item><title>Detection of Privileged Account Creation in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-privileged-account-creation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-privileged-account-creation/</guid><description>Detects the creation of new privileged accounts in Azure environments, potentially indicating initial access, persistence, privilege escalation, or stealth activities by malicious actors.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of new privileged account creation within Azure environments. Attackers often create new admin accounts to establish persistence, escalate privileges, or move laterally within a compromised environment. Monitoring for such activity is crucial, especially given that compromised accounts are a common entry point for various attacks. This activity, if malicious, can lead to significant data breaches, service disruptions, and reputational damage. This detection focuses on identifying &ldquo;Add user&rdquo; and &ldquo;Add member to role&rdquo; events within Azure audit logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure environment, possibly through compromised credentials (T1078.004).</li>
<li>The attacker leverages their access to enumerate existing accounts and roles within the Azure Active Directory.</li>
<li>The attacker attempts to create a new user account with elevated privileges, such as Global Administrator or other custom administrative roles.</li>
<li>The attacker assigns the newly created user account to one or more privileged roles, granting it administrative access to the Azure environment. This action is logged as &ldquo;Add member to role&rdquo;.</li>
<li>The attacker uses the newly created privileged account to perform reconnaissance, identify sensitive data, or deploy malicious applications.</li>
<li>The attacker establishes persistence by maintaining access through the newly created account, even if the initial entry point is detected and remediated.</li>
<li>The attacker escalates privileges to gain control over critical resources and services within the Azure environment.</li>
<li>The attacker uses the privileged account to exfiltrate sensitive data, deploy ransomware, or disrupt critical business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful creation of a privileged account can provide an attacker with persistent access and the ability to escalate privileges, leading to widespread damage. The attacker can gain control over critical resources, exfiltrate sensitive data, deploy ransomware, or disrupt business operations. This can lead to significant financial losses, reputational damage, and legal liabilities. While the scope and number of victims are unknown, all organizations using Azure Active Directory are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect privileged account creation events within Azure Audit Logs.</li>
<li>Investigate any detected instances of privileged account creation to determine whether the activity is legitimate.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with privileged roles, to mitigate the risk of credential compromise (T1110).</li>
<li>Regularly review and audit user account privileges to identify and remove unnecessary or excessive permissions.</li>
<li>Monitor Azure Audit Logs for suspicious activities, such as unusual sign-in attempts, changes to security settings, and modifications to privileged roles.</li>
<li>Implement alerting for changes to privileged roles and groups within Azure AD.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>privileged-account</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category></item><item><title>Azure Subscription Permission Elevation via Activity Logs</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-subscription-elevation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-subscription-elevation/</guid><description>An attacker elevates their Azure subscription permissions to manage all subscriptions, potentially leading to unauthorized access and control over the environment.</description><content:encoded><![CDATA[<p>This threat involves the elevation of user permissions within an Azure environment to manage all Azure subscriptions. While legitimate administrators may perform this action, unauthorized elevation of permissions can grant an attacker significant control over the entire Azure environment. This could be an insider threat or a compromised account being used to broaden access. The activity is logged within Azure Activity Logs, providing an opportunity for detection. Defenders should be aware of this potential escalation path and monitor for unexpected or unauthorized permission changes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an Azure account, potentially through compromised credentials (T1078.004).</li>
<li>The attacker authenticates to the Azure portal or uses Azure CLI/PowerShell with the compromised account.</li>
<li>The attacker attempts to elevate their permissions using the <code>MICROSOFT.AUTHORIZATION/ELEVATEACCESS/ACTION</code> operation.</li>
<li>Azure Activity Logs record the attempt to elevate permissions.</li>
<li>If successful, the attacker gains management access to all Azure subscriptions within the tenant.</li>
<li>The attacker can then provision resources, modify configurations, and access data within those subscriptions.</li>
<li>The attacker might establish persistence by creating new user accounts with elevated privileges or modifying existing roles.</li>
<li>The attacker can then exfiltrate sensitive data or disrupt services within the Azure environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful elevation of permissions to manage all Azure subscriptions allows an attacker to control all resources, data, and configurations within the Azure environment. This can lead to data breaches, service disruptions, financial loss, and reputational damage. The scope of impact depends on the sensitivity of the data stored within Azure and the criticality of the services hosted there.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized <code>MICROSOFT.AUTHORIZATION/ELEVATEACCESS/ACTION</code> operations in Azure Activity Logs.</li>
<li>Investigate any detected instances of <code>MICROSOFT.AUTHORIZATION/ELEVATEACCESS/ACTION</code> immediately, as outlined in the rule description.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts to reduce the risk of credential compromise.</li>
<li>Review and enforce the principle of least privilege for Azure role assignments.</li>
<li>Monitor Azure Activity Logs for other suspicious activities, such as unusual resource creation or modification.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>privilege-escalation</category><category>persistence</category><category>initial-access</category><category>stealth</category></item><item><title>Azure Owner Removed from Application or Service Principal</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-owner-removed/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-owner-removed/</guid><description>An adversary may remove an owner from an Azure application or service principal to weaken access controls, persist in the environment, or escalate privileges.</description><content:encoded><![CDATA[<p>The removal of an owner from an Azure application or service principal can be indicative of malicious activity. An attacker who has gained initial access to an Azure environment might attempt to remove owners from service principals or applications to hinder incident response, establish persistence, or escalate their privileges. This action could be part of a broader attack aimed at compromising cloud resources and data. Detecting this activity is crucial for identifying potentially compromised accounts and preventing further damage within the Azure environment. The activity is logged within the Azure Activity Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an Azure account through compromised credentials or by exploiting a vulnerability.</li>
<li>The attacker enumerates available applications and service principals within the Azure environment to identify potential targets.</li>
<li>The attacker identifies an application or service principal with elevated permissions that would be beneficial to compromise.</li>
<li>The attacker attempts to remove the existing owner from the target application or service principal via the Azure portal, PowerShell, or Azure CLI.</li>
<li>The Azure Activity Logs record an event indicating &ldquo;Remove owner from service principal&rdquo; or &ldquo;Remove owner from application&rdquo;.</li>
<li>If successful, the attacker may assign themselves as the new owner or further modify the permissions of the application or service principal to achieve their objectives.</li>
<li>The attacker leverages the compromised application or service principal to access sensitive resources, exfiltrate data, or deploy malicious workloads.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful removal of an owner from an Azure application or service principal can lead to a significant compromise of cloud resources. This action can disrupt normal operations, allow unauthorized access to sensitive data, and provide a persistent foothold for attackers within the Azure environment. The lack of an owner can prevent proper oversight and incident response, potentially leading to prolonged compromise and increased damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Azure Owner Removed From Application or Service Principal&rdquo; to your SIEM and tune for your environment to detect suspicious owner removal activity in Azure Activity Logs.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on unfamiliar user identities and unusual user agents in the Azure Activity Logs.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts to reduce the risk of credential compromise, which is often the initial access vector.</li>
<li>Regularly review and audit the permissions assigned to applications and service principals to identify and remediate any excessive or unnecessary privileges.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.stealth</category><category>azure</category></item><item><title>Detection of Suspicious Inbox Manipulation Rules in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-inbox-rules/</link><pubDate>Tue, 02 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-inbox-rules/</guid><description>This brief focuses on detecting malicious inbox manipulation rules set within a user's Azure environment, often indicative of account compromise or insider threats aiming to conceal illicit activities.</description><content:encoded><![CDATA[<p>Attackers can create inbox manipulation rules in cloud email environments like Microsoft 365 to hide their activity, exfiltrate data, or conduct further phishing attacks. These rules automatically delete, move, or forward emails based on sender, subject, or keywords. This can be used to hide evidence of a compromised account, or to intercept communications for Business Email Compromise (BEC). The <code>mcasSuspiciousInboxManipulationRules</code> risk event type in Azure Identity Protection flags such suspicious rules, allowing defenders to proactively identify and remediate compromised accounts. This detection focuses on unusual mailbox rule activity indicative of malicious intent, rather than legitimate business workflows.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a user&rsquo;s Azure account, potentially through credential theft or phishing (T1140).</li>
<li>The attacker authenticates to the user&rsquo;s Microsoft 365 account.</li>
<li>The attacker creates a new inbox rule or modifies an existing one using the Exchange admin center, PowerShell, or the Microsoft Graph API.</li>
<li>The rule is configured to automatically delete emails containing specific keywords related to financial transactions or security alerts (T1566).</li>
<li>Alternatively, the rule might forward all emails from specific internal addresses to an external account controlled by the attacker.</li>
<li>The attacker uses the manipulated inbox to conceal their activities, such as unauthorized financial transactions or data exfiltration.</li>
<li>The legitimate user remains unaware of the attacker&rsquo;s actions due to the automatic deletion or redirection of relevant emails.</li>
<li>The attacker maintains persistence by ensuring the inbox rule remains active and undetected, allowing for continued unauthorized access and activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to conceal malicious activity within the compromised account, intercept sensitive information, and maintain persistence. This can lead to significant financial losses due to BEC, data breaches, and reputational damage. Undetected inbox manipulation can also hinder incident response efforts by preventing security teams from identifying and containing the attack in a timely manner.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious Inbox Manipulation Rules&rdquo; to your SIEM and tune the <code>falsepositives</code> list with known good inbox rule behaviors in your organization.</li>
<li>Investigate any triggered alerts by examining the details of the created/modified inbox rules, focusing on their conditions and actions.</li>
<li>Review user sign-in logs for unusual activity preceding the creation of suspicious inbox rules, as described in the Microsoft documentation (<a href="https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins)">https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins)</a>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.stealth</category><category>attack.t1140</category></item><item><title>Unauthorized Guest User Invitations in Azure AD</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-azuread-guest-invite/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-azuread-guest-invite/</guid><description>Detection of unauthorized guest user invitations within an Azure Active Directory tenant, indicating potential privilege escalation, persistence, or initial access attempts.</description><content:encoded><![CDATA[<p>This alert focuses on detecting the invitation of guest users to an Azure Active Directory (AD) tenant by accounts that are not pre-approved to perform this action. Unauthorized guest user invitations can be an indicator of various malicious activities. An attacker could be attempting to escalate privileges by adding an account they control, establish persistence by creating a backdoor account, or gain initial access to the environment. This activity might be part of a broader attack aimed at gaining unauthorized access to sensitive resources or data within the organization&rsquo;s Azure environment. It is important to ensure that only authorized personnel can invite external users to maintain security and prevent potential abuse.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a low-privilege user account within the Azure AD tenant or uses existing compromised credentials.</li>
<li>The attacker attempts to invite an external guest user to the tenant using the compromised account.</li>
<li>The Azure AD audit logs record the &ldquo;Invite external user&rdquo; operation under the UserManagement category.</li>
<li>The audit log event is generated, capturing details such as the user who initiated the invitation (InitiatedBy) and the target guest user&rsquo;s information.</li>
<li>The detection logic evaluates if the InitiatedBy user is within the list of approved guest inviters.</li>
<li>If the inviting user is not on the approved list, the detection rule triggers, indicating a potentially unauthorized guest invitation.</li>
<li>The attacker may then attempt to leverage the newly invited guest account for lateral movement or data exfiltration.</li>
<li>The attacker uses the guest account to access resources and data within the Azure AD environment, potentially leading to data breaches or other security incidents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of this vulnerability can lead to unauthorized access to sensitive data and resources within the Azure AD tenant. While the precise number of potential victims is unknown, the impact could range from a limited breach affecting a small set of resources to a widespread compromise impacting the entire organization. The addition of unauthorized guest accounts can facilitate lateral movement, data exfiltration, and other malicious activities, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule to detect unauthorized guest user invitations in Azure AD audit logs and tune the <code>filter</code> with a list of approved inviters.</li>
<li>Review and restrict the number of users authorized to invite guest users to the Azure AD tenant based on business needs.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, including guest accounts, to prevent unauthorized access (related to audit logs).</li>
<li>Regularly audit Azure AD logs for any suspicious activity related to user management (related to audit logs).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azuread</category><category>guest-user</category><category>privilege-escalation</category><category>persistence</category><category>initial-access</category></item></channel></rss>