{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/products/exchange-server/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":["Microsoft Defender XDR","Exchange Server","Elastic Defend","CrowdStrike","SentinelOne Cloud Funnel"],"_cs_severities":["medium"],"_cs_tags":["exchange","activesync","powershell","persistence"],"_cs_type":"advisory","_cs_vendors":["Microsoft","Crowdstrike","SentinelOne","Elastic"],"content_html":"\u003cp\u003eThis detection identifies the use of the Exchange PowerShell cmdlet, \u003ccode\u003eSet-CASMailbox\u003c/code\u003e, to add a new ActiveSync allowed device. Attackers may target user email to collect sensitive information by adding unauthorized devices to a user\u0026rsquo;s allowed ActiveSync devices. The rule focuses on detecting suspicious PowerShell activity by monitoring for specific command patterns indicative of unauthorized device additions. This activity can lead to persistent access to sensitive email data, bypassing normal authentication controls. The original Elastic detection rule was created on 2020/12/15 and updated on 2026/05/04. This matters for defenders because it highlights a persistence mechanism that can be difficult to detect through traditional means.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAn attacker gains initial access to a privileged account with Exchange management permissions.\u003c/li\u003e\n\u003cli\u003eThe attacker uses PowerShell to execute the \u003ccode\u003eSet-CASMailbox\u003c/code\u003e cmdlet.\u003c/li\u003e\n\u003cli\u003eThe attacker modifies the \u003ccode\u003eActiveSyncAllowedDeviceIDs\u003c/code\u003e attribute for a target user\u0026rsquo;s mailbox.\u003c/li\u003e\n\u003cli\u003eThe attacker adds a rogue device ID to the list of allowed devices.\u003c/li\u003e\n\u003cli\u003eThe attacker configures a mobile device with the rogue device ID to synchronize with the target mailbox.\u003c/li\u003e\n\u003cli\u003eThe attacker gains persistent access to the target user\u0026rsquo;s email, calendar, and contacts.\u003c/li\u003e\n\u003cli\u003eThe attacker exfiltrates sensitive data from the mailbox.\u003c/li\u003e\n\u003cli\u003eThe attacker maintains persistence even after password changes by continuing to synchronize via the added device.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation could lead to unauthorized access to sensitive email data, including confidential communications, financial information, and personal data. This can result in data breaches, compliance violations, and reputational damage. The scope of the impact depends on the privileges of the compromised account and the sensitivity of the data contained in the targeted mailboxes.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eDeploy the Sigma rule \u003ccode\u003eActiveSyncAllowedDeviceID Added via PowerShell\u003c/code\u003e to your SIEM and tune for your environment to detect suspicious activity.\u003c/li\u003e\n\u003cli\u003eEnable Sysmon process-creation logging to capture PowerShell commands for the rule above.\u003c/li\u003e\n\u003cli\u003eReview Exchange audit logs for instances of \u003ccode\u003eSet-CASMailbox\u003c/code\u003e being used to modify \u003ccode\u003eActiveSyncAllowedDeviceIDs\u003c/code\u003e.\u003c/li\u003e\n\u003cli\u003eImplement multi-factor authentication (MFA) for all accounts, especially those with Exchange management privileges.\u003c/li\u003e\n\u003cli\u003eRegularly audit ActiveSync device configurations to identify unauthorized devices.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2024-01-03T12:00:00Z","date_published":"2024-01-03T12:00:00Z","id":"/briefs/2024-01-activesync-device-added/","summary":"The rule detects the use of the Exchange PowerShell cmdlet, Set-CASMailbox, to add a new ActiveSync allowed device, potentially allowing attackers to gain persistent access to sensitive email data by adding unauthorized devices.","title":"New ActiveSync Allowed Device Added via PowerShell","url":"https://feed.craftedsignal.io/briefs/2024-01-activesync-device-added/"}],"language":"en","title":"CraftedSignal Threat Feed — Exchange Server","version":"https://jsonfeed.org/version/1.1"}