<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Account-Compromise — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/account-compromise/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 18:21:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/account-compromise/feed.xml" rel="self" type="application/rss+xml"/><item><title>Azure Identity Protection Atypical Travel Anomaly</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-atypical-travel/</link><pubDate>Tue, 02 Jan 2024 18:21:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-atypical-travel/</guid><description>The Atypical Travel detection in Azure Identity Protection identifies potentially compromised user accounts by detecting geographically improbable sign-in activity, indicative of account compromise or misuse.</description><content:encoded><![CDATA[<p>The Atypical Travel detection in Azure Identity Protection is designed to identify instances where a user signs in from two geographically distant locations within a time frame that makes legitimate travel improbable. This anomaly indicates that an attacker may have compromised a user&rsquo;s credentials and is attempting to access resources from a different location. The alert is triggered by the &lsquo;unlikelyTravel&rsquo; risk event type within Azure&rsquo;s risk detection service. This capability helps defenders identify compromised accounts and prevent further damage such as data exfiltration or lateral movement within the environment. The detection is based on comparing current sign-in locations against the user&rsquo;s historical sign-in patterns, making it more accurate and less prone to false positives compared to simple geo-location based alerts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Credential Compromise:</strong> An attacker obtains a user&rsquo;s credentials through phishing, credential stuffing, or malware.</li>
<li><strong>Initial Access (Location A):</strong> The attacker uses the compromised credentials to sign in from a location that may be atypical for the user.</li>
<li><strong>Successful Authentication (Location A):</strong> The attacker successfully authenticates and gains access to Azure resources.</li>
<li><strong>Privilege Escalation (Optional):</strong> If the compromised account has sufficient permissions, the attacker attempts to escalate privileges within the Azure environment.</li>
<li><strong>Lateral Movement (Optional):</strong> The attacker uses the compromised account to move laterally to other resources or accounts within the Azure environment.</li>
<li><strong>Second Sign-in (Location B):</strong> Within a short timeframe, the attacker (or another attacker using the same credentials) signs in from a geographically distant location (Location B).</li>
<li><strong>Atypical Travel Alert:</strong> Azure Identity Protection detects the unlikely travel scenario based on the two geographically improbable sign-ins.</li>
<li><strong>Resource Access/Data Exfiltration:</strong> The attacker accesses sensitive resources or exfiltrates data from the environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Atypical Travel attack can lead to unauthorized access to sensitive data, privilege escalation, lateral movement within the Azure environment, and potentially data exfiltration. The number of victims depends on the scope of the compromised user&rsquo;s access and the attacker&rsquo;s objectives. Organizations in all sectors are potentially at risk, as attackers often target user accounts with elevated privileges or access to critical data. The financial impact can include the cost of incident response, data breach notifications, and potential regulatory fines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect Atypical Travel events (logsource: azure, service: riskdetection).</li>
<li>Investigate flagged sessions in the context of other sign-ins from the user, as suggested by the false positives guidance.</li>
<li>Implement multi-factor authentication (MFA) for all users to mitigate the risk of credential compromise.</li>
<li>Review and enforce conditional access policies to restrict access based on location and other factors.</li>
<li>Monitor user accounts for unusual activity, such as changes in sign-in patterns or resource access.</li>
<li>Implement account lockout policies to prevent brute-force attacks against user accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>identity-protection</category><category>atypical-travel</category><category>account-compromise</category><category>credential-theft</category></item><item><title>Impossible Travel Detection in Azure AD</title><link>https://feed.craftedsignal.io/briefs/2024-01-impossible-travel/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-impossible-travel/</guid><description>This brief describes the detection of 'impossible travel' events in Azure AD, where a user appears to log in from geographically distant locations within an implausibly short time frame, potentially indicating account compromise.</description><content:encoded><![CDATA[<p>This rule detects &ldquo;impossible travel&rdquo; events within Azure Active Directory (Azure AD), a common indicator of account compromise. The scenario involves a user account exhibiting login activity from two geographically distant locations in a timeframe that makes physical travel between them impossible. This anomalous behavior often signifies that an attacker has gained unauthorized access to the account and is operating from a different location than the legitimate user. The rule leverages Azure AD Identity Protection&rsquo;s risk detection capabilities to identify such instances. This detection is crucial for defenders as it highlights potential breaches and enables swift remediation actions to prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a user&rsquo;s credentials, potentially through phishing (T1566), credential stuffing, or malware.</li>
<li>The attacker authenticates to Azure AD from a geographic location different from the legitimate user&rsquo;s typical location.</li>
<li>Shortly after the initial authentication, the legitimate user authenticates to Azure AD from their usual location.</li>
<li>Azure AD Identity Protection flags the activity as &ldquo;impossible travel&rdquo; due to the conflicting geographic locations and the short timeframe between the authentications.</li>
<li>The &ldquo;impossibleTravel&rdquo; risk event is logged within Azure AD&rsquo;s risk detection logs.</li>
<li>The attacker may attempt to escalate privileges within the compromised account (T1068) to gain broader access to resources.</li>
<li>The attacker may move laterally within the organization (T1021) to access sensitive data or systems.</li>
<li>The attacker&rsquo;s ultimate goal could be data exfiltration, financial theft, or disruption of services, depending on the organization&rsquo;s profile.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful &ldquo;impossible travel&rdquo; attack can lead to a full compromise of the user&rsquo;s account, granting the attacker access to sensitive data, internal systems, and other resources accessible to the user. Depending on the user&rsquo;s role and permissions, the impact could range from data breaches to financial losses and significant reputational damage. Organizations in all sectors are vulnerable, with a higher risk for those handling sensitive data or operating critical infrastructure. The number of affected users depends on the attacker&rsquo;s ability to move laterally and escalate privileges after compromising the initial account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect &ldquo;impossible travel&rdquo; events flagged by Azure AD Identity Protection, focusing on the <code>riskEventType: 'impossibleTravel'</code> (logsource: azure, service: riskdetection).</li>
<li>Investigate any triggered alerts promptly, focusing on the user account involved and the geographic locations of the login attempts (logsource: azure, service: riskdetection).</li>
<li>Review and enhance user training programs to educate employees on the risks of phishing and credential compromise (T1566).</li>
<li>Implement multi-factor authentication (MFA) for all users to mitigate the risk of unauthorized access even if credentials are compromised (T1110).</li>
<li>Review and adjust the sensitivity of Azure AD Identity Protection&rsquo;s risk detection policies to align with your organization&rsquo;s risk tolerance.</li>
<li>Consider implementing conditional access policies that restrict access based on geographic location or require MFA for logins from unfamiliar locations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azuread</category><category>identity-protection</category><category>impossible-travel</category><category>account-compromise</category><category>lateral-movement</category></item></channel></rss>