<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Application — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/application/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 17:24:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/application/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detect Application AppID URI Configuration Changes in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-appid-uri-change/</link><pubDate>Wed, 03 Jan 2024 17:24:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-appid-uri-change/</guid><description>Detection of configuration changes to an application's AppID URI in Azure, potentially indicating malicious activity related to initial access, persistence, credential access, privilege escalation, or stealth.</description><content:encoded><![CDATA[<p>Attackers may modify the AppID URI of an application in Azure to facilitate various malicious activities, including gaining unauthorized access, establishing persistence, accessing credentials, escalating privileges, or maintaining stealth within the environment. The AppID URI serves as a unique identifier for an application within the Azure Active Directory (Azure AD) ecosystem. Changes to this URI could indicate that an attacker is attempting to impersonate a legitimate application or service, potentially bypassing security controls and gaining elevated access. Monitoring for these changes is crucial for defenders to identify and respond to potentially malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure account, possibly through compromised credentials or exploiting a vulnerability (T1078.004).</li>
<li>The attacker enumerates available applications and service principals within the Azure environment.</li>
<li>The attacker identifies a target application with a high-value AppID URI.</li>
<li>The attacker modifies the AppID URI of the target application, potentially to impersonate another service or application (T1552).</li>
<li>This change might be done to allow the attacker to request tokens for that application.</li>
<li>The attacker leverages the modified AppID URI to request access tokens, potentially gaining unauthorized access to resources (T1078.004).</li>
<li>The attacker uses the acquired access tokens to move laterally within the Azure environment and access sensitive data or systems.</li>
<li>The attacker maintains persistence by using the modified application for continued unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of an AppID URI can lead to significant security breaches, including unauthorized access to sensitive data, privilege escalation, and persistent compromise of the Azure environment. An attacker can impersonate legitimate applications, bypassing security controls and potentially affecting numerous resources and users. The scope of the impact depends on the permissions and access levels associated with the compromised application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Application AppID Uri Configuration Changes&rdquo; to your SIEM to detect unauthorized modifications to AppID URIs (rule provided below).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the AppID URI changes.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts to reduce the risk of credential compromise.</li>
<li>Regularly review and audit application permissions and configurations to identify and remediate any misconfigurations.</li>
<li>Monitor Azure audit logs for other suspicious activities related to application and service principal management.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>appid</category><category>uri</category><category>application</category><category>serviceprincipal</category><category>credential-access</category><category>privilege-escalation</category></item><item><title>Detection of Azure Application Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-app-deletion/</link><pubDate>Wed, 03 Jan 2024 15:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-app-deletion/</guid><description>This alert identifies when an application is deleted within an Azure environment, which could indicate malicious activity or unintended misconfiguration leading to service disruption.</description><content:encoded><![CDATA[<p>This detection focuses on identifying instances where an application is deleted within an Azure environment. While legitimate application deletions occur as part of IT administration, malicious actors might delete applications to disrupt services, remove evidence of their presence, or prepare for a larger attack by removing security controls or access points. This activity is logged within Azure Activity Logs and includes events such as &ldquo;Delete application&rdquo; and &ldquo;Hard Delete application&rdquo;. Monitoring these events can provide early warning of potential security incidents or compliance violations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to an Azure account, potentially through compromised credentials or exploiting a vulnerability in an application.</li>
<li><strong>Privilege Escalation (Optional):</strong> The attacker escalates their privileges within the Azure environment to gain sufficient permissions to manage and delete applications.</li>
<li><strong>Reconnaissance:</strong> The attacker identifies target applications for deletion, potentially those critical for business operations or those used for security controls.</li>
<li><strong>Disable Monitoring (Optional):</strong> The attacker attempts to disable logging or monitoring related to application management to avoid detection.</li>
<li><strong>Application Deletion:</strong> The attacker initiates the deletion of the targeted application using the Azure portal, Azure CLI, or PowerShell.</li>
<li><strong>Confirmation/Hard Delete:</strong> Depending on the application&rsquo;s configuration and Azure policies, the attacker may need to confirm the deletion or perform a &ldquo;hard delete&rdquo; to permanently remove the application.</li>
<li><strong>Cover Tracks:</strong> The attacker attempts to remove any remaining logs or traces of their activity to hinder forensic investigation.</li>
<li><strong>Impact:</strong> Service disruption or data loss due to the deleted application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deletion of an Azure application can lead to significant service disruption, data loss, and potential financial damages. The impact depends on the criticality of the deleted application and the organization&rsquo;s disaster recovery capabilities. Successful deletion can interrupt business processes, impacting both internal users and external customers. It may also lead to reputational damage and compliance violations if the application handled sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect application deletion events in Azure Activity Logs.</li>
<li>Review user roles and permissions in Azure Active Directory (Entra ID) and enforce the principle of least privilege.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with administrative privileges.</li>
<li>Enable auditing and logging for all Azure resources, including application management activities.</li>
<li>Investigate any detected application deletion events promptly to determine the root cause and potential impact.</li>
<li>Establish a process for reviewing and approving application deletion requests to prevent accidental or malicious deletions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>application</category><category>deletion</category><category>impact</category><category>t1489</category></item><item><title>Azure Application URI Configuration Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-app-uri-modification/</link><pubDate>Wed, 03 Jan 2024 14:21:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-app-uri-modification/</guid><description>Detection of Azure application URI modifications that can be indicative of malicious activity, such as using dangling URIs, non-HTTPS URIs, wildcard domains, or URIs pointing to uncontrolled domains, potentially leading to initial access, stealth, persistence, credential access, and privilege escalation.</description><content:encoded><![CDATA[<p>Attackers may modify application URIs within Azure Active Directory to redirect users or applications to malicious resources, obtain unauthorized access, or establish persistence. The modification of an application&rsquo;s URI can be a subtle but effective technique for gaining a foothold in an environment. By manipulating the URI settings, attackers can redirect traffic to attacker-controlled servers, intercept credentials, or perform other malicious actions. This activity is often difficult to detect because it can blend in with legitimate administrative tasks. Investigation is merited if URIs for domain names no longer exist, are not using HTTPS, have wildcards at the end of the domain, are not unique to that app, or point to domains that the organization does not control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an Azure account with sufficient privileges to modify application registrations.</li>
<li>The attacker navigates to the Azure Active Directory portal.</li>
<li>The attacker locates a target application registration.</li>
<li>The attacker modifies the application&rsquo;s URI settings, such as the reply URLs or identifier URIs.</li>
<li>The attacker configures the URI to point to a malicious server or a phishing page.</li>
<li>Users or applications are redirected to the malicious URI when attempting to authenticate or access the application.</li>
<li>The attacker intercepts credentials or performs other malicious actions.</li>
<li>The attacker establishes persistence by maintaining control over the application&rsquo;s URI settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to credential theft, data breaches, or unauthorized access to sensitive resources. By compromising application URIs, attackers can redirect users to phishing pages, intercept credentials, or gain a foothold in the environment for further exploitation. This activity can be difficult to detect and can have a significant impact on the organization&rsquo;s security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Application URI Configuration Changes</code> to your SIEM to detect suspicious modifications to application URIs in Azure Audit Logs.</li>
<li>Investigate any alerts generated by the Sigma rule <code>Application URI Configuration Changes</code> to determine if the URI modification is legitimate or malicious.</li>
<li>Monitor Azure Audit Logs for any changes to application URI settings (as indicated by <code>properties.message: Update Application Sucess- Property Name AppAddress</code>) and validate the legitimacy of the changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>azure</category><category>application</category><category>uri</category><category>modification</category><category>persistence</category><category>credential-access</category><category>privilege-escalation</category></item></channel></rss>