<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Office 365 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/office-365/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:15:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/office-365/feed.xml" rel="self" type="application/rss+xml"/><item><title>O365 Advanced Audit Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-01-o365-advanced-audit-disabled/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-o365-advanced-audit-disabled/</guid><description>Detection of O365 advanced audit being disabled for a specific user, potentially allowing attackers to operate with reduced risk of detection, leading to unauthorized data access, data exfiltration, or account compromise.</description><content:encoded><![CDATA[<p>This analytic detects instances where the O365 advanced audit is disabled for a specific user within an Office 365 tenant. It leverages O365 audit logs, specifically focusing on events related to audit license changes within Azure Active Directory workloads. Disabling the O365 advanced audit is a significant security concern, as it removes critical logging and visibility into user and administrator activities. Attackers could exploit this gap to operate with a reduced risk of detection. The activity is identified via the &ldquo;Change user license.&rdquo; operation and the presence of &ldquo;<em>M365_ADVANCED_AUDITING</em>&rdquo; in the DisabledPlans field of the audit logs. The source is the Splunk ES Content Update (ESCU) with the ID 49862dd4-9cb2-4c48-a542-8c8a588d9361.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a privileged account with sufficient permissions to modify user licenses within the Office 365 tenant.</li>
<li>The attacker uses the privileged account to navigate to the Azure Active Directory or Microsoft 365 admin center.</li>
<li>The attacker modifies the license configuration for a target user account.</li>
<li>Specifically, the attacker disables the &ldquo;M365_ADVANCED_AUDITING&rdquo; plan for the target user, which stops the collection of advanced audit logs.</li>
<li>The system records an O365 management activity event with Operation=&ldquo;Change user license.&rdquo; and the DisabledPlans containing &ldquo;M365_ADVANCED_AUDITING&rdquo;.</li>
<li>With advanced auditing disabled, the attacker performs malicious activities within the target user&rsquo;s account (e.g., data access, data exfiltration, sending phishing emails).</li>
<li>These malicious actions are not fully logged or audited due to the disabled advanced auditing, thus reducing the chances of detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling advanced auditing can blind security teams to malicious actions. Attackers could operate within the user&rsquo;s mailbox or account with reduced risk of detection, potentially leading to unauthorized data access, data exfiltration, or account compromise. This can lead to significant data breaches, financial losses, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect instances of disabled O365 advanced auditing based on <code>o365_management_activity</code> events.</li>
<li>Investigate any detected instances of disabled advanced auditing to determine if the change was authorized and legitimate.</li>
<li>Monitor the O365 management activity logs for &ldquo;Change user license&rdquo; operations, focusing on changes to audit-related plans.</li>
<li>Implement alerting for changes to user license, especially those that disable audit features using the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>o365</category><category>audit</category><category>defense-evasion</category><category>persistence</category></item><item><title>O365 Security Feature Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-o365-security-feature-changed/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-o365-security-feature-changed/</guid><description>Attackers modify or disable Office 365 advanced security settings, such as AntiPhish, SafeLink, SafeAttachment, or Malware policies, to evade detection and operate with reduced risk within the target tenant.</description><content:encoded><![CDATA[<p>Attackers may target Office 365 security settings to weaken defenses and operate with impunity inside the tenant. By disabling or modifying features like AntiPhish, SafeLink, SafeAttachment, and Malware policies, attackers reduce the chances of their malicious activities being detected. This allows them to conduct unauthorized data access, data exfiltration, account compromise, and other malicious actions without triggering alerts or leaving a clear audit trail. These modifications can persist over time, enabling long-term access and control within the compromised environment. The modifications leave evidence in the Office 365 Management Activity logs, which defenders can monitor for suspicious changes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to an account with sufficient privileges to modify O365 security settings, potentially through credential theft or phishing (not detailed in source).</li>
<li>Privilege Escalation (if needed): If the compromised account lacks the necessary permissions, the attacker attempts to escalate privileges within the O365 tenant.</li>
<li>Discovery: The attacker uses the compromised account to explore the O365 environment and identify available security settings that can be modified or disabled.</li>
<li>Disable Security Features: The attacker disables or modifies key security features, such as AntiPhish, SafeLink, SafeAttachment, and Malware policies, using O365 management tools or PowerShell cmdlets (e.g., Set-AntiPhishPolicy).</li>
<li>Persistence: By weakening security controls, the attacker establishes a persistent presence within the O365 tenant, reducing the likelihood of detection.</li>
<li>Data Exfiltration/Lateral Movement: With security features disabled, the attacker can move laterally within the environment, access sensitive data, and exfiltrate it without triggering security alerts.</li>
<li>Cover Tracks: The attacker may attempt to delete or modify audit logs to further conceal their activities, though this is not directly described in the source.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of O365 security features can lead to significant damage, including unauthorized access to sensitive data, data exfiltration, account compromise, and further malicious activities within the tenant. The reduction in security monitoring creates a window of opportunity for attackers to conduct a wide range of attacks without being detected, leading to potential financial losses, reputational damage, and compliance violations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided below to your SIEM and tune them for your environment to detect changes to O365 email security features based on the <code>o365_management_activity</code> logs.</li>
<li>Investigate any alerts triggered by the Sigma rules to determine the legitimacy of the changes and the potential impact on the security posture of the O365 tenant.</li>
<li>Monitor the Office 365 Universal Audit Log for suspicious activities related to the modification of security settings as outlined in the <code>search</code> query in the brief.</li>
<li>Review and harden O365 role-based access controls (RBAC) to limit the accounts that can modify security settings, following Microsoft&rsquo;s security recommendations at <a href="https://learn.microsoft.com/en-us/entra/fundamentals/security-defaults">https://learn.microsoft.com/en-us/entra/fundamentals/security-defaults</a>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>o365</category><category>email_security</category><category>defense_evasion</category><category>persistence</category></item><item><title>O365 MFA Bypassed via Trusted IP Addition</title><link>https://feed.craftedsignal.io/briefs/2024-01-o365-mfa-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-o365-mfa-bypass/</guid><description>An attacker modifies trusted IP settings in Office 365 to bypass multi-factor authentication (MFA), potentially leading to unauthorized access and data compromise.</description><content:encoded><![CDATA[<p>Attackers can weaken an organization&rsquo;s security by adding new IP addresses to the trusted IPs list in Office 365. By manipulating the trusted IP configuration, attackers can bypass Multi-Factor Authentication (MFA), gaining unauthorized access to sensitive resources and systems. This technique circumvents a critical security control designed to protect against credential compromise. The activity is often performed after initial access has been gained through other means, such as phishing or credential stuffing. Defenders should monitor changes to trusted IP configurations and investigate any unauthorized modifications promptly. The references suggest this technique is used to maintain persistence in compromised cloud environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an account with sufficient privileges, possibly via credential compromise or phishing.</li>
<li>The attacker authenticates to the Office 365 portal using the compromised credentials.</li>
<li>The attacker navigates to the Azure Active Directory admin center.</li>
<li>The attacker modifies the Conditional Access policies to add a new trusted IP range. This is achieved by setting the <code>StrongAuthenticationPolicy</code> property.</li>
<li>The attacker sets the <code>ModifiedProperties{}.Name</code> to <code>StrongAuthenticationPolicy</code> within the O365 management activity logs.</li>
<li>The attacker ensures the <code>ModifiedProperties{}.NewValue</code> contains a new IP address range that allows bypass of MFA.</li>
<li>The attacker uses a device within the newly trusted IP range to authenticate to Office 365 services.</li>
<li>MFA is bypassed, granting the attacker access to sensitive data and systems within the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can lead to significant damage. Attackers can gain unauthorized access to sensitive information, potentially leading to data breaches, financial losses, and reputational damage. By bypassing MFA, attackers can move laterally within the organization&rsquo;s cloud environment, compromising additional accounts and resources. The number of affected users and the severity of the impact depend on the scope of access granted to the compromised account. Organizations in all sectors that rely on Office 365 are potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Install the Splunk Microsoft Office 365 add-on to ingest the required logs, as mentioned in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Deploy the provided Sigma rule to detect suspicious modifications to trusted IP addresses in O365.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the user (<code>user</code>) and IP address (<code>ip_addresses_new_added</code>) involved.</li>
<li>Review existing Conditional Access policies and trusted IP configurations to ensure they align with security best practices.</li>
<li>Implement stricter monitoring and alerting for administrative accounts to detect unauthorized changes to security configurations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mfa_bypass</category><category>o365</category><category>defense_evasion</category></item></channel></rss>