<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Attack.impact — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/attack.impact/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 29 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/attack.impact/feed.xml" rel="self" type="application/rss+xml"/><item><title>Okta Policy Rule Modification or Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-okta-policy-rule-modification/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-okta-policy-rule-modification/</guid><description>An Okta policy rule was modified or deleted, potentially weakening security controls.</description><content:encoded><![CDATA[<p>Okta is a widely used identity and access management platform. Threat actors may target Okta configurations to weaken an organization&rsquo;s security posture. This activity involves modifications or deletions of policy rules within Okta. Such changes can reduce the effectiveness of multi-factor authentication (MFA) requirements, bypass access controls, or disable security logging. Detection of these changes is crucial to maintaining a strong security baseline and preventing unauthorized access to sensitive resources. Defenders should monitor Okta logs for unexpected or unauthorized policy rule modifications or deletions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains unauthorized access to an Okta administrator account, possibly through credential theft or phishing.</li>
<li>Authentication: The attacker authenticates to the Okta admin dashboard using the compromised credentials.</li>
<li>Discovery: The attacker enumerates existing policy rules to understand the current security configuration.</li>
<li>Modification: The attacker modifies an existing policy rule to weaken its security controls. This could involve disabling MFA, bypassing location restrictions, or altering group membership requirements.</li>
<li>Deletion: Alternatively, the attacker deletes a policy rule entirely, effectively removing a layer of security.</li>
<li>Privilege Escalation: With weakened or removed policy rules, the attacker escalates privileges, gaining access to sensitive applications or data.</li>
<li>Lateral Movement: The attacker leverages the compromised Okta environment to move laterally within the organization&rsquo;s network, accessing additional systems and resources.</li>
<li>Impact: The attacker achieves their final objective, such as data exfiltration, financial fraud, or system disruption, due to the weakened security posture.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or deletion of Okta policy rules can severely compromise an organization&rsquo;s security. Consequences include unauthorized access to sensitive data, privilege escalation, lateral movement, and ultimately, data breaches or financial loss. The number of affected users and systems depends on the scope of the compromised policy rules and the attacker&rsquo;s subsequent actions. Organizations in all sectors that rely on Okta for identity management are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Okta Policy Rule Modified or Deleted&rdquo; Sigma rule to your SIEM to detect unauthorized changes (rule reference).</li>
<li>Review Okta system logs regularly for policy rule modifications or deletions, focusing on unusual source IPs or user agents.</li>
<li>Implement multi-factor authentication (MFA) for all Okta administrator accounts to prevent unauthorized access (reference: Okta documentation).</li>
<li>Enforce the principle of least privilege for Okta administrator roles, limiting the number of users who can modify policy rules.</li>
<li>Alert on eventType <code>policy.rule.update</code> or <code>policy.rule.delete</code> in Okta logs using the provided Sigma rule (rule reference).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>okta</category><category>identity</category><category>policy</category><category>attack.impact</category></item><item><title>Linux Service Stop and Disable Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-linux-service-disable/</link><pubDate>Tue, 09 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-linux-service-disable/</guid><description>Attackers may halt or disable security services on Linux systems to evade defenses, maintain persistence, or disrupt operations, detected through the use of utilities like 'systemctl', 'service', and 'chkconfig'.</description><content:encoded><![CDATA[<p>Attackers may attempt to stop or disable services on a compromised Linux system to impair security tools, disrupt operations, or facilitate further malicious activities. This can involve disabling security software, logging mechanisms, or other critical services that could hinder the attacker&rsquo;s objectives. This activity often forms part of a broader attack campaign aimed at maintaining persistence, evading detection, or causing system-wide disruption. The commands <code>systemctl</code>, <code>service</code>, and…</p>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.defense-evasion</category><category>attack.t1562</category><category>attack.impact</category><category>attack.t1489</category></item><item><title>Azure Network Firewall Policy Modification or Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-policy-changes/</link><pubDate>Wed, 03 Jan 2024 18:12:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-policy-changes/</guid><description>An adversary may modify or delete Azure Network Firewall Policies to impair defenses and potentially impact network security.</description><content:encoded><![CDATA[<p>Attackers may target Azure Network Firewall Policies to weaken an organization&rsquo;s security posture. By modifying existing policies, adversaries can introduce rules that allow malicious traffic, disable existing protections, or create backdoors for future access. Deleting firewall policies altogether removes a critical layer of defense, potentially exposing internal resources to external threats. This activity is typically conducted after gaining initial access to the Azure environment through compromised credentials or other means. Monitoring for unauthorized changes to firewall policies is critical for maintaining network security and preventing potential data breaches or service disruptions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Azure environment, possibly through compromised credentials or a vulnerability in a deployed application.</li>
<li>The attacker enumerates existing Azure Network Firewall Policies using Azure CLI or PowerShell commands.</li>
<li>The attacker identifies a firewall policy to modify or delete to achieve their objectives.</li>
<li>If modifying, the attacker uses commands such as <code>Set-AzNetworkFirewallPolicy</code> or the Azure portal to alter the policy rules, potentially adding permissive rules or disabling existing restrictions.</li>
<li>If deleting, the attacker uses commands such as <code>Remove-AzNetworkFirewallPolicy</code> or the Azure portal to remove the firewall policy entirely.</li>
<li>The changes are applied to the Azure Network Firewall, impacting network traffic filtering.</li>
<li>The attacker validates the effectiveness of the modified or deleted policy by testing network connectivity to previously protected resources.</li>
<li>The attacker proceeds to exploit the newly exposed resources for data exfiltration, lateral movement, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or deletion of Azure Network Firewall policies can lead to significant security breaches. Attackers may be able to bypass network segmentation, gain unauthorized access to sensitive data, disrupt critical services, or deploy malicious code within the network. The impact can range from data theft and financial loss to reputational damage and regulatory penalties. The number of affected resources depends on the scope of the compromised firewall policy and the attacker&rsquo;s subsequent actions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule &ldquo;Azure Network Firewall Policy Modified or Deleted&rdquo; to detect unauthorized changes to firewall policies (logsource: azure, service: activitylogs).</li>
<li>Review user identities and user agents associated with detected events to determine if the changes were made by authorized personnel or malicious actors, as detailed in the false positives section.</li>
<li>Enable multi-factor authentication (MFA) for all Azure accounts to reduce the risk of credential compromise.</li>
<li>Enforce the principle of least privilege by granting users only the necessary permissions to manage firewall policies.</li>
<li>Implement continuous monitoring and alerting for all Azure resources, including network firewalls, to detect suspicious activity and potential security breaches.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.impact</category><category>attack.defense-impairment</category><category>attack.t1686.001</category></item><item><title>Adversaries Disabling Important Scheduled Tasks</title><link>https://feed.craftedsignal.io/briefs/2024-01-schtasks-disable/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-schtasks-disable/</guid><description>Adversaries disable crucial scheduled tasks, such as those related to BitLocker, Windows Defender, System Restore and Windows Update, using schtasks.exe to disrupt services and potentially facilitate data destruction or ransomware deployment.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting scheduled tasks to disable critical system functions. This tactic involves using <code>schtasks.exe</code> to disable essential tasks related to security, backup, and update mechanisms. By disabling tasks like Windows Defender scans, System Restore points, BitLocker encryption, and Windows Update, adversaries can significantly weaken a system&rsquo;s defenses, making it more vulnerable to data destruction or ransomware attacks. The observed behavior involves the execution of…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.impact</category><category>attack.t1489</category></item><item><title>System Restore Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-system-restore-disable/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-system-restore-disable/</guid><description>Attackers may attempt to disable system restore via registry modifications through the command line to prevent recovery after malicious activity.</description><content:encoded>&lt;p>Attackers may attempt to disable the Windows System Restore feature to hinder forensic analysis and recovery efforts. This involves modifying specific registry keys related to System Restore configuration and operation, effectively preventing the system from creating or using restore points. The commands are executed via cmd, PowerShell or other scripting engines. Disabling System Restore can allow malware to operate without the risk of easy rollback, potentially increasing the impact of a…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.impact</category><category>attack.t1490</category></item><item><title>Okta Unauthorized Application Access Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-okta-unauthorized-app-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-okta-unauthorized-app-access/</guid><description>This brief describes a detection for unauthorized application access attempts within an Okta environment, indicating a potential security breach or misconfiguration.</description><content:encoded><![CDATA[<p>This detection identifies instances where a user attempts to access an application within an Okta environment without proper authorization. The activity is logged within the Okta system logs, providing a clear indication of the unauthorized access attempt. This type of event is crucial for defenders as it may signify several issues, including compromised user accounts, misconfigured application permissions, or internal users attempting to escalate their privileges. This detection focuses specifically on the &ldquo;User attempted unauthorized access to app&rdquo; message within Okta logs. Identifying and investigating these events promptly can prevent data breaches and maintain the integrity of the Okta environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user attempts to access a protected application integrated with Okta.</li>
<li>Okta evaluates the user&rsquo;s authentication status and group memberships against the application&rsquo;s access policies.</li>
<li>The user lacks the necessary permissions or roles assigned to access the requested application.</li>
<li>Okta denies access to the application for the user.</li>
<li>Okta generates a system log event with the &ldquo;User attempted unauthorized access to app&rdquo; message.</li>
<li>The security monitoring system ingests the Okta log event.</li>
<li>The detection rule triggers based on the specific log message.</li>
<li>An alert is generated, prompting security analysts to investigate the unauthorized access attempt and take appropriate remedial actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful unauthorized access to applications can lead to significant data breaches, compromise sensitive information, and disrupt business operations. While this detection identifies attempted unauthorized access, repeated attempts or eventual success due to misconfiguration can result in severe consequences. A single successful breach can lead to data exfiltration, financial loss, and reputational damage. Identifying and remediating these attempts is crucial to preventing these outcomes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM or security monitoring platform to detect unauthorized application access attempts in Okta (Sigma rule: &ldquo;Okta Unauthorized Access to App&rdquo;).</li>
<li>Investigate all triggered alerts promptly to determine the root cause of the unauthorized access attempt (Okta logs).</li>
<li>Review and validate application access policies within Okta to ensure users have appropriate permissions and roles assigned.</li>
<li>Implement multi-factor authentication (MFA) for all users to reduce the risk of compromised accounts being used for unauthorized access (Okta configuration).</li>
<li>Monitor Okta system logs for related events, such as account lockouts or password reset attempts, which might indicate account compromise (Okta logs).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.impact</category><category>threat-type</category><category>platform</category></item><item><title>Okta Policy Modification or Deletion Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-policy-change/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-policy-change/</guid><description>An Okta policy was modified or deleted, potentially indicating unauthorized changes to security configurations within the Okta identity management platform by a malicious actor or insider.</description><content:encoded><![CDATA[<p>This alert identifies modifications or deletions of Okta policies, which govern authentication, authorization, and access control within the Okta Identity Cloud platform. While legitimate administrators routinely update policies, unauthorized changes can weaken security postures and grant malicious actors elevated privileges or bypass security controls. The source event indicates a potential compromise or insider threat activity within the Okta environment. Because Okta serves as a critical identity provider for many organizations, any unauthorized change to its policies can have far-reaching consequences. Detecting policy changes is crucial for maintaining the integrity and security of the Okta environment and preventing potential breaches. The targeted scope includes all Okta-managed applications and resources protected by the modified or deleted policy.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains access to an Okta administrator account, either through compromised credentials (e.g., phishing, credential stuffing) or insider access.</li>
<li><strong>Authentication:</strong> The attacker authenticates to the Okta admin console using the compromised or legitimate administrator account.</li>
<li><strong>Policy Enumeration:</strong> The attacker identifies target Okta policies to modify or delete using the Okta admin console or API.</li>
<li><strong>Policy Modification/Deletion:</strong> The attacker modifies or deletes the targeted Okta policy through the Okta admin console or API. This generates an <code>policy.lifecycle.update</code> or <code>policy.lifecycle.delete</code> event.</li>
<li><strong>Privilege Escalation (Potential):</strong> By modifying policies, the attacker may escalate privileges, granting themselves or other unauthorized users access to sensitive applications and resources.</li>
<li><strong>Lateral Movement (Potential):</strong> With escalated privileges, the attacker moves laterally within the Okta environment, accessing other applications and resources.</li>
<li><strong>Data Exfiltration/Damage (Potential):</strong> The attacker leverages the compromised Okta environment to exfiltrate sensitive data or cause damage to connected systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Okta policy modification or deletion can have significant consequences. Unauthorized policy changes can weaken security controls, allowing attackers to bypass authentication mechanisms, escalate privileges, and gain unauthorized access to sensitive applications and data. This could lead to data breaches, financial loss, and reputational damage. The impact depends on the scope of the affected policy and the applications it protects. The number of victims could range from a few individuals to the entire organization, depending on the scope of the compromised policy.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect Okta policy modifications or deletions (<code>policy.lifecycle.update</code>, <code>policy.lifecycle.delete</code> event types).</li>
<li>Investigate any detected policy changes to verify their legitimacy and identify the user responsible.</li>
<li>Review Okta administrator account activity for any signs of compromise or unauthorized access.</li>
<li>Implement multi-factor authentication (MFA) for all Okta administrator accounts to prevent unauthorized access.</li>
<li>Regularly review and audit Okta policies to ensure they are configured securely and in accordance with security best practices.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>identity</category><category>okta</category><category>policy</category><category>attack.impact</category></item><item><title>Deletion of Critical Scheduled Tasks</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-schtasks-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-schtasks-deletion/</guid><description>Adversaries delete critical scheduled tasks, such as those related to BitLocker, ExploitGuard, System Restore, Windows Defender, and Windows Update, to disrupt security measures and enable data destruction.</description><content:encoded>&lt;p>Attackers may attempt to delete scheduled tasks to disable security mechanisms or prevent system recovery, creating an environment conducive to data destruction. This involves using the &lt;code>schtasks.exe&lt;/code> utility to remove scheduled tasks related to critical system functions. This activity is designed to impair incident response, prevent restoration of systems, and generally increase the impact of an attack. This is done by removing the scheduled tasks, which prevents the execution of security…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.impact</category><category>attack.t1489</category></item></channel></rss>