<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Attack.privilege-Escalation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/attack.privilege-escalation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 11 Jul 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/attack.privilege-escalation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Malicious Usage of AWS IMDS Credentials Outside of Expected Services</title><link>https://feed.craftedsignal.io/briefs/2024-07-aws-imds-abuse/</link><pubDate>Thu, 11 Jul 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-aws-imds-abuse/</guid><description>Compromised EC2 instances may be leveraged to exfiltrate and misuse AWS Instance Metadata Service (IMDS) credentials to perform actions outside of the expected AWS Simple Systems Manager (SSM) service, indicating potential lateral movement or data exfiltration.</description><content:encoded><![CDATA[<p>This activity focuses on the potential misuse of AWS Instance Metadata Service (IMDS) credentials. When an EC2 instance is compromised, an attacker can extract the temporary credentials stored within the IMDS. These credentials, associated with an assumed role, grant the attacker the ability to interact with other AWS services. The abnormal use of these credentials outside of the expected AWS Simple Systems Manager (SSM) service may indicate malicious activity such as lateral movement, data exfiltration, or resource compromise. This is particularly concerning when the compromised instance is being used as a pivot point to access other AWS resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An EC2 instance is compromised through an initial access vector (e.g., software vulnerability, misconfiguration, or credential compromise).</li>
<li>The attacker gains access to the compromised EC2 instance&rsquo;s operating system.</li>
<li>The attacker queries the IMDS endpoint (http://169.254.169.254/latest/meta-data/iam/security-credentials/) to obtain temporary AWS credentials associated with the instance&rsquo;s IAM role.</li>
<li>The attacker configures their local AWS CLI or SDK with the exfiltrated credentials.</li>
<li>The attacker attempts to perform actions against other AWS services using the exfiltrated credentials.</li>
<li>The attacker attempts to escalate privileges or move laterally within the AWS environment.</li>
<li>The attacker attempts to access, modify, or exfiltrate sensitive data from other AWS services.</li>
<li>The attacker maintains persistence by creating new IAM users or roles with excessive permissions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data stored in AWS services such as S3, DynamoDB, and RDS. This could result in data breaches, financial loss, and reputational damage. Attackers can also leverage the compromised credentials to pivot to other AWS resources, potentially impacting critical infrastructure and services. Organizations with lax security configurations and overly permissive IAM roles are at higher risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Malicious Usage Of IMDS Credentials Outside Of AWS Infrastructure&rdquo; to your SIEM and tune for your environment to detect anomalous use of IMDS credentials.</li>
<li>Review and restrict IAM roles assigned to EC2 instances to follow the principle of least privilege, limiting the scope of potential damage from credential exfiltration.</li>
<li>Monitor CloudTrail logs for unusual API calls originating from EC2 instances with assumed roles, specifically those not related to SSM.</li>
<li>Harden EC2 instances to prevent initial compromise by applying security patches, configuring strong authentication, and regularly scanning for vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.privilege-escalation</category><category>attack.initial-access</category><category>attack.persistence</category><category>attack.stealth</category><category>attack.t1078</category><category>attack.t1078.002</category></item><item><title>Unauthorized Modification of Azure Conditional Access Policy</title><link>https://feed.craftedsignal.io/briefs/2024-05-29-azure-ca-policy-update/</link><pubDate>Wed, 29 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-29-azure-ca-policy-update/</guid><description>An unauthorized actor modifies an Azure Conditional Access policy, potentially leading to privilege escalation, credential access, persistence, or defense impairment.</description><content:encoded><![CDATA[<p>Compromised or malicious actors may attempt to modify Azure Conditional Access (CA) policies to weaken security controls, elevate privileges, or establish persistence within the Azure environment. Conditional Access policies are critical for enforcing organizational security standards, and unauthorized changes can have significant security implications. This activity is detected through Azure Audit Logs by monitoring for &ldquo;Update conditional access policy&rdquo; events. Defenders should investigate any modifications to Conditional Access policies to ensure they are legitimate and align with security best practices. Detecting and responding to unauthorized CA policy modifications is crucial for maintaining the integrity and security of the Azure environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access through compromised credentials or other means (not specified in source).</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages existing privileges or exploits vulnerabilities to gain sufficient permissions to modify Conditional Access policies (e.g., through a compromised Global Administrator account).</li>
<li><strong>Policy Enumeration:</strong> The attacker enumerates existing Conditional Access policies to identify targets for modification using tools like Azure PowerShell or the Azure portal.</li>
<li><strong>Policy Modification:</strong> The attacker modifies a Conditional Access policy, for example, by weakening MFA requirements, excluding specific users or groups from the policy, or disabling the policy altogether.</li>
<li><strong>Persistence:</strong> By weakening or disabling Conditional Access policies, the attacker establishes a persistent foothold in the environment, allowing them to bypass security controls and maintain unauthorized access.</li>
<li><strong>Credential Access:</strong> With weakened MFA or other access controls, the attacker gains easier access to sensitive credentials.</li>
<li><strong>Defense Impairment:</strong> The modification of CA policies impairs the organization&rsquo;s defense mechanisms, making it easier for the attacker to perform malicious activities undetected.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of Conditional Access policies can lead to significant security breaches, including unauthorized access to sensitive data, privilege escalation, and persistent compromise of the Azure environment. The number of affected users and resources depends on the scope of the modified policies. Organizations may experience data loss, financial losses, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;CA Policy Updated by Non Approved Actor&rdquo; Sigma rule to your SIEM to detect unauthorized modifications to Conditional Access policies within your Azure environment.</li>
<li>Review the <code>properties.message</code> field in the Azure Audit Logs for &ldquo;Update conditional access policy&rdquo; events and compare &ldquo;old&rdquo; vs &ldquo;new&rdquo; values to understand the nature of the changes.</li>
<li>Implement strict role-based access control (RBAC) to limit the number of users who can modify Conditional Access policies.</li>
<li>Investigate any alerts generated by the Sigma rule and verify whether the user identity, user agent, and/or hostname should be making changes in your environment.</li>
<li>Enable multi-factor authentication (MFA) for all users, especially those with administrative privileges, to reduce the risk of credential compromise (related to attack.credential-access tag).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>conditional-access</category><category>policy-modification</category><category>attack.privilege-escalation</category><category>attack.credential-access</category><category>attack.persistence</category><category>attack.defense-impairment</category><category>attack.t1548</category><category>attack.t1556</category></item><item><title>Azure AD Root Certificate Authority Added for Passwordless Authentication</title><link>https://feed.craftedsignal.io/briefs/2024-05-azuread-root-ca-add/</link><pubDate>Wed, 08 May 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-azuread-root-ca-add/</guid><description>An attacker may add a new root certificate authority to an Azure AD tenant to support certificate-based authentication for persistence, privilege escalation, or defense evasion.</description><content:encoded><![CDATA[<p>The addition of a new root certificate authority (CA) in Azure Active Directory (Azure AD) to support certificate-based authentication (CBA) can be a sign of malicious activity. While CBA offers passwordless authentication benefits, attackers can abuse it to establish persistent access, escalate privileges, or evade detection. An attacker with sufficient privileges in the Azure AD tenant can add a rogue CA, enabling them to authenticate as any user within the directory, even without their password. This bypasses multi-factor authentication (MFA) and grants unauthorized access to sensitive resources and data. Defenders should monitor Azure AD audit logs for unexpected modifications to the <code>TrustedCAsForPasswordlessAuth</code> setting, as this could indicate a compromised administrator account or an insider threat attempting to establish a backdoor.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Compromise an Azure AD administrator account with sufficient privileges to modify tenant-wide settings. This may be achieved through phishing, credential stuffing, or exploiting vulnerabilities.</li>
<li>The attacker authenticates to the Azure portal or uses PowerShell cmdlets to interact with Azure AD.</li>
<li>The attacker executes commands to add a new, attacker-controlled root certificate authority to the <code>TrustedCAsForPasswordlessAuth</code> setting. This involves modifying the Company Information object.</li>
<li>The attacker generates or obtains a certificate signed by the newly added root CA.</li>
<li>The attacker uses the certificate to authenticate to Azure AD as a targeted user, bypassing password requirements and multi-factor authentication.</li>
<li>The attacker gains access to the targeted user&rsquo;s resources, such as email, files, and applications.</li>
<li>The attacker escalates privileges within the Azure AD tenant by impersonating highly privileged users or roles.</li>
<li>The attacker maintains persistent access to the Azure AD tenant, even if the compromised administrator account is remediated.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to complete compromise of the Azure AD tenant, including access to sensitive data, applications, and resources. Attackers can use the compromised tenant to move laterally to other systems, exfiltrate data, or disrupt business operations. The number of potential victims is dependent on the size of the Azure AD tenant. Organizations across all sectors are at risk, especially those heavily reliant on Azure AD for identity and access management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;New Root Certificate Authority Added&rdquo; to your SIEM to detect unauthorized modifications to the <code>TrustedCAsForPasswordlessAuth</code> setting (rule).</li>
<li>Review Azure AD audit logs regularly for suspicious activity related to the &ldquo;Set Company Information&rdquo; operation (logsource).</li>
<li>Implement multi-factor authentication (MFA) for all Azure AD accounts, including administrators, but understand that CBA can bypass it.</li>
<li>Enforce the principle of least privilege and restrict the number of accounts with permissions to modify tenant-wide settings.</li>
<li>Monitor for the use of certificates signed by unknown or untrusted CAs to authenticate to Azure AD.</li>
<li>Consult the SpecterOps and Goodworkaround articles for more information on certificate-based authentication abuse in Azure AD (references).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.credential-access</category><category>attack.persistence</category><category>attack.privilege-escalation</category><category>attack.defense-impairment</category><category>attack.t1556</category></item><item><title>Azure AD Sign-in from New Country/Region</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-azure-new-country-signin/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-azure-new-country-signin/</guid><description>Detection of Azure AD sign-ins originating from countries or regions not previously associated with a user, indicating potential account compromise or anomalous activity.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting suspicious sign-in activity within Azure Active Directory (Azure AD). Specifically, it targets sign-ins originating from countries or regions that are new or unusual for a given user. This behavior can be indicative of compromised credentials, travel without notification, or the use of VPN/proxy services to mask the true origin of the sign-in. Microsoft Entra ID Protection identifies &ldquo;new country&rdquo; as a risk event when a user signs in from a location that is drastically different from their recent sign-in history. Detecting these anomalies is crucial for preventing unauthorized access and mitigating potential data breaches. The detection uses Azure AD&rsquo;s risk detection logs to identify such events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains access to a valid user&rsquo;s credentials, potentially through phishing, credential stuffing, or malware. (T1078)</li>
<li><strong>Anomalous Login:</strong> The attacker attempts to sign in to Azure AD using the compromised credentials from a country or region not typically associated with the user.</li>
<li><strong>Risk Detection Trigger:</strong> Azure AD Identity Protection identifies the sign-in as high-risk due to the new country/region and logs a &ldquo;newCountry&rdquo; risk event.</li>
<li><strong>Persistence:</strong> The attacker may establish persistent access by creating new accounts or modifying existing ones.</li>
<li><strong>Privilege Escalation:</strong> If the compromised account has elevated privileges, the attacker may attempt to escalate their privileges within the Azure environment.</li>
<li><strong>Lateral Movement:</strong> The attacker may use the compromised account to move laterally within the organization, accessing other resources and data.</li>
<li><strong>Data Exfiltration:</strong> The attacker accesses sensitive data and attempts to exfiltrate it from the environment.</li>
<li><strong>Impact:</strong> The attacker achieves their objectives, which could include data theft, financial fraud, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack following a sign-in from a new country can result in unauthorized access to sensitive data, compromised user accounts, and potential data breaches. Organizations may experience financial losses, reputational damage, and legal liabilities. The number of victims and the extent of the damage depend on the privileges of the compromised account and the attacker&rsquo;s objectives. Immediate containment is crucial to prevent further damage if a new country sign-in is verified as malicious.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM or security analytics platform to detect &ldquo;newCountry&rdquo; risk events in Azure AD (logsource: azure, service: riskdetection).</li>
<li>Investigate any alerts generated by the Sigma rule in the context of other sign-in activities for the affected user to rule out false positives.</li>
<li>Implement multi-factor authentication (MFA) for all users to mitigate the risk of account compromise (T1078).</li>
<li>Monitor user activity logs for other suspicious behaviors, such as unusual access patterns or attempts to escalate privileges.</li>
<li>Review and enforce conditional access policies to restrict access based on location, device, and other factors.</li>
<li>Educate users about phishing and other social engineering tactics to prevent credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.stealth</category><category>attack.t1078</category><category>attack.persistence</category><category>attack.privilege-escalation</category><category>attack.initial-access</category></item><item><title>Windows Registry Classes Autorun Keys Modification for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-classes-autorun-keys-modification/</link><pubDate>Sun, 28 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-classes-autorun-keys-modification/</guid><description>Adversaries modify Windows Registry Classes keys to establish persistence by executing malicious code when specific file types are opened or actions are performed, potentially leading to privilege escalation and persistent access.</description><content:encoded><![CDATA[<p>Attackers can manipulate Windows Registry Classes keys, an autostart extensibility point (ASEP), to achieve persistence. This involves modifying registry entries that control how the operating system handles specific file types or shell actions. By modifying these keys, adversaries can ensure their malicious code executes whenever a user interacts with a specific file type (e.g., opening an .exe) or performs a specific action within the shell. This technique, which has been observed since at least 2019, allows malicious actors to maintain a persistent foothold on compromised systems. While legitimate software also utilizes these registry keys, careful filtering and monitoring are crucial for distinguishing malicious modifications from benign software installations. Detection can be noisy due to the legitimate use of these keys, so tuning and review is critical.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access through a separate vector (e.g., phishing, exploit). This stage is not covered by this detection, which focuses on post-exploitation activity.</li>
<li>Privilege Escalation (if needed): The attacker may need elevated privileges to modify certain registry keys. This can involve exploiting vulnerabilities or leveraging existing administrative rights.</li>
<li>Registry Key Modification: The attacker modifies specific keys under <code>\Software\Classes</code> in the Windows Registry. Common targets include <code>\Folder\ShellEx\ExtShellFolderViews</code>, <code>\.exe</code>, and <code>\Directory\Shellex\DragDropHandlers</code>.</li>
<li>Payload植入：攻击者修改注册表项指向一个恶意可执行文件或脚本。这可能涉及替换默认命令或添加新的处理程序。</li>
<li>Execution Trigger: The malicious code is configured to execute when a user interacts with the associated file type or shell action (e.g., opening a .exe file, right-clicking a folder).</li>
<li>Malicious Payload Execution: When the configured trigger occurs, the malicious payload executes, giving the attacker control over the system.</li>
<li>Persistence Maintained: The modified registry keys ensure that the malicious payload will continue to execute whenever the trigger occurs, maintaining persistence across reboots or user logons.</li>
<li>Objective Achieved: The attacker leverages persistent access to achieve their objectives, such as data exfiltration, lateral movement, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to compromised systems, bypassing traditional security measures. This can lead to significant data breaches, financial losses, and reputational damage. The number of potential victims is broad, as any Windows system is potentially vulnerable. The types of damage possible range from credential theft to ransomware deployment, depending on the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Registry auditing and monitor <code>registry_set</code> events for modifications to keys under <code>\Software\Classes</code> to identify suspicious activity.</li>
<li>Deploy the Sigma rule &ldquo;Classes Autorun Keys Modification&rdquo; to your SIEM and tune the filters (filter_main_<em>, filter_optional_</em>) for your specific environment to reduce false positives.</li>
<li>Investigate any registry modifications detected by the Sigma rule, focusing on unusual executables or scripts being launched from these locations.</li>
<li>Regularly review and update the filters in the Sigma rule to account for legitimate software changes in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.privilege-escalation</category><category>attack.persistence</category><category>attack.t1547.001</category></item><item><title>User Added to Group with Conditional Access Policy Modification Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-group-add/</link><pubDate>Wed, 03 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-group-add/</guid><description>An attacker adds a user to a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, credential access, persistence, and defense impairment.</description><content:encoded><![CDATA[<p>This activity involves the addition of a user to an Azure Active Directory group that possesses the ability to modify Conditional Access (CA) policies. Conditional Access policies are used to enforce authentication requirements based on various conditions (user, location, device, etc.). If an attacker gains the ability to modify these policies, they can weaken security controls to facilitate privilege escalation, credential access, persistence within the environment, and impair defenses. This type of attack can be initiated by an insider threat or external compromise of an account. The goal is to manipulate CA policies to bypass multi-factor authentication, grant unauthorized access, or maintain persistence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a user account or service principal with sufficient privileges to manage group memberships in Azure AD. This could be achieved through credential compromise or other initial access vectors.</li>
<li>The attacker identifies a target Azure AD group that has permissions to manage Conditional Access policies. These groups are often used to delegate administrative control over CA policies.</li>
<li>The attacker uses the Azure portal, PowerShell, or the Azure AD Graph API/Microsoft Graph API to add a malicious user account to the target group.</li>
<li>The Azure Audit Logs record the &ldquo;Add member from group&rdquo; event, indicating the change in group membership.</li>
<li>The newly added malicious user inherits the group&rsquo;s permissions, which includes the ability to view, create, modify, and delete Conditional Access policies.</li>
<li>The attacker modifies existing CA policies to weaken security controls. For example, they might exclude themselves from MFA requirements or grant access to sensitive resources without proper authorization.</li>
<li>The attacker leverages their modified CA policies to gain unauthorized access to sensitive data or resources.</li>
<li>The attacker establishes persistence by creating new CA policies that ensure their continued access, even if their initial access is revoked.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this attack chain can lead to significant compromise of an organization&rsquo;s Azure environment. Attackers can bypass MFA, gain access to sensitive resources, establish persistent access, and impair security defenses. The extent of the damage depends on the permissions associated with the compromised group and the scope of the modified Conditional Access policies. This can lead to data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect additions of users to groups with CA policy modification access and tune for your environment.</li>
<li>Regularly review and audit Azure AD group memberships, especially for groups with administrative privileges (as detected by the Sigma rule).</li>
<li>Implement multi-factor authentication for all users, especially those with administrative privileges.</li>
<li>Enforce the principle of least privilege when assigning permissions to Azure AD groups.</li>
<li>Monitor Azure AD audit logs for suspicious activity related to group membership changes and Conditional Access policy modifications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.privilege-escalation</category><category>attack.credential-access</category><category>attack.persistence</category><category>attack.defense-impairment</category><category>attack.t1548</category><category>attack.t1556</category></item><item><title>Azure AD Authentication to Important Apps Using Single-Factor Authentication</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-single-factor-auth/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-single-factor-auth/</guid><description>Detection of successful Azure AD authentications to critical applications that only required single-factor authentication, potentially indicating a security lapse or policy violation leading to unauthorized access.</description><content:encoded><![CDATA[<p>This alert focuses on detecting potentially risky authentication events within Azure Active Directory. Specifically, it flags successful logins to applications deemed &ldquo;important&rdquo; where the authentication process only involved a single factor. This bypasses the added security of multi-factor authentication (MFA), potentially exposing these applications to compromise if the single factor (e.g., password) is weak, stolen, or compromised. The alert is designed to identify deviations from a secure authentication baseline, particularly in environments where MFA is expected for sensitive resources. The applications considered &ldquo;important&rdquo; must be pre-defined by the defender for this detection to function effectively.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a valid username and password through phishing, credential stuffing, or other means.</li>
<li>The attacker attempts to authenticate to a pre-defined, high-value application within the Azure AD environment.</li>
<li>Azure AD processes the authentication request.</li>
<li>The application is configured to allow single-factor authentication.</li>
<li>Azure AD verifies the supplied username and password against its directory.</li>
<li>Upon successful verification, Azure AD grants the attacker access to the application.</li>
<li>The attacker gains unauthorized access to the application&rsquo;s data and functionality.</li>
<li>Depending on the application and attacker&rsquo;s motives, this could lead to data exfiltration, privilege escalation, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of successful single-factor authentication to critical applications can range from minor data breaches to significant compromises of sensitive systems. The number of potential victims depends on the application&rsquo;s user base and the sensitivity of the data it manages. Sectors most at risk include those handling financial, healthcare, or sensitive personal information. A successful attack could lead to data theft, financial loss, reputational damage, and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Populate the <code>AppId</code> field in the Sigma rule with the Application IDs of your organization&rsquo;s critical applications.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the single-factor authentication.</li>
<li>Enforce multi-factor authentication (MFA) for all users accessing critical applications to mitigate the risk of credential compromise.</li>
<li>Review and update Azure AD Conditional Access policies to ensure appropriate authentication requirements are in place.</li>
<li>Tune the Sigma rule based on observed false positives in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.privilege-escalation</category><category>attack.persistence</category><category>attack.initial-access</category><category>attack.stealth</category><category>attack.t1078</category></item><item><title>Detection of Azure Subscription Permission Elevation</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-privilege-elevation/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-privilege-elevation/</guid><description>Detection of a user being assigned the 'User Access Administrator' role, which grants the ability to manage all Azure Subscriptions, potentially leading to privilege escalation and unauthorized access.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unauthorized elevation of privileges within Azure environments. Specifically, it addresses the assignment of the &lsquo;User Access Administrator&rsquo; role to a user, which allows managing access to all Azure subscriptions. This activity can be indicative of malicious actors attempting to gain control over an Azure environment or an insider threat escalating their privileges without proper authorization. The detection is based on Azure Audit Logs and can help identify potentially compromised accounts or misconfigurations. A successful elevation can lead to unauthorized access, data breaches, and service disruptions. Defenders should closely monitor these events and investigate any unexpected privilege escalations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure account, possibly through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker attempts to assign the &lsquo;User Access Administrator&rsquo; role to themselves or another account they control.</li>
<li>This assignment generates an &lsquo;Administrative&rsquo; audit log event with the OperationName &lsquo;Assigns the caller to user access admin&rsquo;.</li>
<li>The attacker now has the ability to manage user access to all Azure subscriptions within the tenant.</li>
<li>The attacker creates new user accounts with elevated privileges within the subscriptions.</li>
<li>The attacker leverages the newly created accounts to access sensitive resources and data.</li>
<li>The attacker performs reconnaissance activities to identify critical assets and data stores.</li>
<li>The attacker exfiltrates sensitive data or deploys malicious workloads within the compromised subscriptions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation to the &lsquo;User Access Administrator&rsquo; role can have severe consequences. It grants the attacker complete control over the Azure subscriptions, allowing them to access sensitive data, disrupt services, and potentially compromise the entire cloud environment. The number of affected subscriptions depends on the scope of the compromised account. This attack targets any organization utilizing Azure subscriptions and is particularly impactful for those storing sensitive data or running critical applications in the cloud.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule &ldquo;Azure Subscription Permission Elevation Via AuditLogs&rdquo; to your SIEM and tune it for your environment to detect the &lsquo;Assigns the caller to user access admin&rsquo; event in the Azure Audit Logs.</li>
<li>Investigate any detected instances of this event to determine if the privilege elevation was authorized and legitimate.</li>
<li>Review and enforce the principle of least privilege for all Azure accounts to minimize the impact of potential compromises; reference the Microsoft Entra documentation for guidance.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with administrative privileges, to prevent unauthorized access via compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.privilege-escalation</category><category>attack.persistence</category><category>attack.initial-access</category><category>attack.stealth</category><category>attack.t1078</category></item><item><title>Azure AD Successful Authentication Increase</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-auth-increase/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-auth-increase/</guid><description>This detection identifies a statistically significant (10% or greater) increase in successful sign-ins to Azure Active Directory, potentially indicating credential compromise or account takeover attempts.</description><content:encoded><![CDATA[<p>This alert identifies a potentially malicious increase in successful sign-ins within an Azure Active Directory environment. An attacker who has compromised credentials may attempt to leverage them repeatedly, resulting in a higher-than-normal volume of successful authentications. While not definitive proof of compromise, a sudden spike warrants further investigation. This behavior is typically observed during the initial access, persistence, privilege escalation, or stealth phases of an attack. This detection focuses on identifying increases of 10% or greater, providing a starting point for identifying anomalous activity. Defenders should investigate the source of the increase, focusing on specific users, applications, or geographic locations involved.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Credential Compromise:</strong> The attacker obtains valid user credentials through phishing, brute-force, or credential stuffing attacks against Azure AD.</li>
<li><strong>Initial Access:</strong> The attacker uses the compromised credentials to successfully authenticate to Azure AD, gaining initial access to the environment (T1078).</li>
<li><strong>Enumeration:</strong> The attacker enumerates available resources, applications, and user accounts within the Azure AD environment.</li>
<li><strong>Privilege Escalation:</strong> The attacker attempts to escalate privileges by exploiting misconfigurations or vulnerabilities in Azure AD or related applications. This may involve authenticating to multiple resources.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence mechanisms, such as creating new accounts or modifying existing ones, to maintain access to the environment. This may involve repeatedly authenticating to refresh tokens or maintain sessions.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised account to access other resources or accounts within the Azure AD environment, potentially triggering further successful sign-ins.</li>
<li><strong>Data Exfiltration or Damage:</strong> The attacker uses the compromised access to exfiltrate sensitive data or disrupt business operations.</li>
<li><strong>Covering Tracks:</strong> The attacker attempts to cover their tracks by disabling logging or deleting audit trails to avoid detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack following a measurable increase in authentications can lead to unauthorized access to sensitive data, financial loss, reputational damage, and disruption of business operations. The specific impact depends on the level of access gained by the attacker and the resources they are able to compromise. For example, an attacker gaining access to an administrator account could potentially take control of the entire Azure AD environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Measurable Increase Of Successful Authentications&rdquo; Sigma rule to your SIEM and tune for your environment. This rule detects increases of 10% or greater in successful sign-ins (rule, logsource: azure, service: signinlogs).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the source of the increased authentications and the users/applications involved.</li>
<li>Review the Microsoft Entra ID Protection reports for unusual sign-in activity, as referenced in the source material: <a href="https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#monitoring-for-successful-unusual-sign-ins">https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#monitoring-for-successful-unusual-sign-ins</a>.</li>
<li>Implement multi-factor authentication (MFA) for all users to reduce the risk of credential compromise.</li>
<li>Monitor for other suspicious activities, such as unusual sign-in locations, access to sensitive resources, or changes to user accounts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.privilege-escalation</category><category>attack.persistence</category><category>attack.initial-access</category><category>attack.stealth</category><category>attack.t1078</category></item><item><title>Unauthorized Conditional Access Policy Creation in Azure AD</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-ca-policy-add/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-ca-policy-add/</guid><description>An unauthorized actor created a new Conditional Access policy in Azure AD, potentially leading to privilege escalation and unauthorized access.</description><content:encoded><![CDATA[<p>This threat brief addresses the creation of a new Conditional Access (CA) policy within Azure Active Directory (Azure AD) by an actor not authorized to perform such actions. Conditional Access policies are critical security controls that enforce organizational policies based on various conditions, such as user identity, location, device, and application. Unauthorized modification or creation of these policies can lead to significant security breaches, allowing attackers to bypass security controls, escalate privileges, and gain unauthorized access to sensitive resources. This activity is detected via Azure Audit Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to an account with sufficient privileges to interact with Azure AD, potentially through compromised credentials or an insider threat.</li>
<li><strong>Privilege Escalation (If Needed):</strong> The attacker escalates privileges within Azure AD to a role that permits the creation or modification of Conditional Access policies.</li>
<li><strong>Policy Creation:</strong> The attacker creates a new Conditional Access policy using the Azure portal, PowerShell, or Azure CLI.</li>
<li><strong>Policy Configuration:</strong> The attacker configures the CA policy to weaken security controls, such as disabling MFA for specific users, locations, or applications.</li>
<li><strong>Bypass Security Controls:</strong> The newly created or modified CA policy allows the attacker to bypass intended security controls, granting them unauthorized access.</li>
<li><strong>Lateral Movement:</strong> With bypassed security controls, the attacker moves laterally within the network, accessing sensitive resources and data.</li>
<li><strong>Data Exfiltration/Impact:</strong> The attacker achieves their final objective, such as exfiltrating sensitive data or causing disruption to business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The creation of unauthorized Conditional Access policies can have severe consequences, including unauthorized access to sensitive data, privilege escalation, and circumvention of security controls. The impact can range from data breaches and financial loss to reputational damage and disruption of critical business services. If successful, attackers could gain complete control over the Azure AD environment, affecting all connected services and applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized CA policy creation events in Azure Audit Logs.</li>
<li>Review Azure AD role assignments to ensure least privilege and restrict CA policy management to authorized personnel only.</li>
<li>Investigate any alerts generated by the Sigma rule to identify the actor and the details of the created CA policy.</li>
<li>Implement multi-factor authentication (MFA) for all users, especially those with administrative privileges, to reduce the risk of credential compromise.</li>
<li>Monitor Azure AD audit logs for other suspicious activities, such as changes to user accounts, group memberships, and application registrations.</li>
<li>Establish a baseline of expected CA policy configurations and alert on deviations from this baseline.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>conditional-access</category><category>privilege-escalation</category><category>attack.privilege-escalation</category><category>attack.t1548</category></item><item><title>Office Application Autorun Registry Key Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-office-autorun-registry-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-office-autorun-registry-modification/</guid><description>Adversaries modify Office application autostart extensibility point (ASEP) registry keys to achieve persistence and execute malicious code when Office applications are launched.</description><content:encoded><![CDATA[<p>Attackers may target Microsoft Office applications&rsquo; autostart extensibility points (ASEPs) in the Windows Registry to establish persistence. By modifying specific registry keys, malicious actors can ensure that their code is executed each time an Office application, such as Word, Excel, or Outlook, is launched. This technique is often employed to maintain a foothold on a compromised system. While legitimate add-ins also leverage these registry keys, unauthorized modifications can lead to the execution of arbitrary code, potentially resulting in data theft, system compromise, or further exploitation. Defenders should be aware that many legitimate applications modify these keys. Thorough testing and tuning is required.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system via an unrelated method.</li>
<li>The attacker identifies the relevant Office application ASEP registry keys: <code>\Software\Wow6432Node\Microsoft\Office</code>, <code>\Software\Microsoft\Office</code> and specific application keys like <code>\Word\Addins</code>, <code>\Excel\Addins</code>, etc.</li>
<li>The attacker modifies the registry key to point to a malicious executable or script. This could be achieved using tools like <code>reg.exe</code> or PowerShell.</li>
<li>The registry modification ensures that the malicious code is executed upon the next launch of the targeted Office application.</li>
<li>The user launches the Office application (e.g., Word, Excel, Outlook).</li>
<li>The Office application reads the modified registry key and executes the associated malicious code.</li>
<li>The malicious code performs its intended actions, such as downloading additional payloads, establishing command and control, or stealing data.</li>
<li>The attacker maintains persistence on the system through the modified registry key, ensuring continued access and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence on compromised systems. This can lead to data exfiltration, deployment of ransomware, or further lateral movement within the network. The modification of these keys is often performed to maintain a persistent presence, allowing attackers to regain access to the system even after reboots or user logoffs. While the number of direct victims is unknown, the potential for widespread impact is significant, especially in organizations heavily reliant on Microsoft Office applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable registry modification logging and deploy the provided Sigma rules to your SIEM to detect suspicious changes to Office application autostart registry keys.</li>
<li>Regularly audit the Office application add-ins installed on systems to identify and remove any unauthorized or malicious extensions (reference: Sigma rules).</li>
<li>Implement application whitelisting to prevent the execution of unauthorized executables and scripts (reference: Attack Chain).</li>
<li>Monitor process execution events for Office applications launching unusual or suspicious child processes (reference: Attack Chain).</li>
<li>Tune and customize the provided Sigma rules based on your environment&rsquo;s baseline of legitimate Office add-in activity to minimize false positives (reference: Sigma rules).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.privilege-escalation</category><category>attack.persistence</category><category>attack.t1547.001</category></item><item><title>Detection of Important Scheduled Task Deletion or Disablement</title><link>https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-deletion/</guid><description>Adversaries delete or disable critical scheduled tasks, such as those related to system restore, Windows Defender, BitLocker, Windows Backup, or Windows Update, to disrupt operations and potentially conduct data destructive activities.</description><content:encoded>&lt;p>This brief focuses on the detection of malicious activity related to the deletion or disabling of important scheduled tasks within a Windows environment. Adversaries may target these tasks to disrupt normal system operations, escalate privileges, establish persistence, or facilitate data destruction. The targeted tasks often include critical system functions like System Restore, Windows Defender updates, BitLocker encryption, Windows Backup processes, and Windows Update mechanisms. This…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.execution</category><category>attack.privilege-escalation</category><category>attack.persistence</category><category>attack.t1053.005</category></item><item><title>Azure AD User Added to Administrator Role</title><link>https://feed.craftedsignal.io/briefs/2024-01-azuread-admin-role-add/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azuread-admin-role-add/</guid><description>An adversary adds a user to an Azure Active Directory administrative role to gain initial access, persist in the environment, escalate privileges, and potentially operate stealthily.</description><content:encoded><![CDATA[<p>Attackers may attempt to add new members to administrative roles in Azure Active Directory to establish persistence and elevate privileges. This allows them to perform actions as a highly privileged user, potentially bypassing security controls and accessing sensitive resources. The activity is logged within Azure Activity Logs, specifically when the &lsquo;Add member to role&rsquo; operation is executed within the &lsquo;AzureActiveDirectory&rsquo; workload, targeting roles with names ending in &lsquo;Admins&rsquo; or &lsquo;Administrator&rsquo;. Monitoring these events can help detect unauthorized privilege escalation and potential malicious activity within the Azure environment. This activity could be the result of compromised credentials or an insider threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Compromise an existing user account with sufficient permissions to modify Azure AD roles.</li>
<li>Authenticate to the Azure portal or utilize Azure CLI with the compromised account.</li>
<li>Identify a target Azure AD administrative role (e.g., Global Administrator, Security Administrator).</li>
<li>Execute the &lsquo;Add member to role&rsquo; operation, adding the attacker-controlled user to the target role. This can be performed via the Azure portal, PowerShell, or Azure CLI.</li>
<li>The Azure Activity Logs record the &lsquo;Add member to role.&rsquo; event, with the &lsquo;Workload&rsquo; as &lsquo;AzureActiveDirectory&rsquo;.</li>
<li>The <code>ModifiedProperties{}.NewValue</code> field reflects the addition of the user to the admin role, containing strings like &ldquo;Admins&rdquo; or &ldquo;Administrator.&rdquo;</li>
<li>The attacker authenticates as the newly added user, inheriting the privileges of the administrative role.</li>
<li>The attacker leverages the elevated privileges to access sensitive data, modify configurations, or deploy malicious applications.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful addition of a user to an Azure AD administrative role grants the attacker extensive control over the Azure environment. This can lead to data breaches, service disruptions, and the deployment of malicious applications.  Compromised administrator accounts can be used to disable security features, modify audit logs, and create backdoors for persistent access. Detection is critical to limit the scope and duration of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect instances of users being added to Azure AD administrative roles (logsource: azure, service: activitylogs).</li>
<li>Investigate any detected instances of the &ldquo;Add member to role.&rdquo; operation in Azure AD Activity Logs where the ModifiedProperties{}.NewValue ends with &lsquo;Admins&rsquo; or &lsquo;Administrator&rsquo; to validate legitimate administrative changes.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with administrative privileges, to mitigate the risk of compromised credentials.</li>
<li>Regularly review Azure AD role assignments to identify and remove unnecessary privileges.</li>
<li>Monitor for unusual activity from newly added members of administrative roles after the &lsquo;Add member to role&rsquo; event.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.initial-access</category><category>attack.persistence</category><category>attack.privilege-escalation</category><category>attack.stealth</category><category>attack.t1098.003</category><category>attack.t1078</category></item><item><title>AWS STS AssumeRole Misuse for Lateral Movement and Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-assumerole-misuse/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-assumerole-misuse/</guid><description>Abuse of AWS STS AssumeRole can allow attackers to move laterally within an AWS environment and escalate privileges, potentially leading to unauthorized access to sensitive resources and data.</description><content:encoded><![CDATA[<p>The AWS Security Token Service (STS) AssumeRole function allows users or applications to assume a different IAM role, granting temporary access to resources and permissions associated with that role.  Attackers who gain initial access to an AWS account can misuse AssumeRole to move laterally to other roles and escalate their privileges. This can occur if the initial role has overly permissive trust relationships or if an attacker can manipulate the role assumption process.  This activity is detected through CloudTrail logs that record the AssumeRole event. The impact of this activity can be significant, depending on the permissions associated with the roles assumed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised credentials or an exploited vulnerability.</li>
<li>The attacker identifies IAM roles within the AWS environment that they may be able to assume.</li>
<li>The attacker attempts to use the <code>AssumeRole</code> API call to assume a different role. This call includes parameters specifying the target role ARN and a session name.</li>
<li>AWS STS validates the request.  Successful validation depends on the trust policy of the target role and the permissions of the initial user or role.</li>
<li>If the validation is successful, AWS STS returns temporary security credentials (access key ID, secret access key, and session token) to the attacker.</li>
<li>The attacker uses these temporary credentials to access AWS resources and perform actions authorized by the assumed role.</li>
<li>The attacker continues to move laterally and escalate privileges by assuming additional roles.</li>
<li>The attacker achieves their objective, such as accessing sensitive data, modifying configurations, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a wide range of impacts, including unauthorized access to sensitive data stored in S3 buckets or databases, modification or deletion of critical infrastructure configurations, and disruption of AWS services. The scope of the impact depends on the permissions associated with the roles that the attacker is able to assume. This can affect any organization using AWS, and the consequences can range from data breaches and financial losses to reputational damage and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM and tune for your environment to detect suspicious <code>AssumeRole</code> activity based on <code>userIdentity.type</code> and <code>userIdentity.sessionContext.sessionIssuer.type</code>.</li>
<li>Review and harden IAM role trust policies to ensure that only authorized entities can assume roles.</li>
<li>Monitor CloudTrail logs for unusual patterns of <code>AssumeRole</code> API calls, especially those originating from unfamiliar user identities or locations.</li>
<li>Implement multi-factor authentication (MFA) for all IAM users to reduce the risk of credential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.lateral-movement</category><category>attack.privilege-escalation</category><category>attack.t1548</category><category>attack.t1550</category><category>attack.t1550.001</category></item><item><title>Azure PIM - Role Assignment Outside of Privileged Identity Management</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-assigned-outside/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-assigned-outside/</guid><description>Detection of privilege role assignments outside of Azure Privileged Identity Management (PIM) can indicate potential attacker activity related to initial access, stealth, persistence, or privilege escalation within the Azure environment.</description><content:encoded><![CDATA[<p>The unauthorized assignment of privileged roles outside of Azure Privileged Identity Management (PIM) represents a significant security risk. Attackers may attempt to bypass PIM controls to gain persistent access, escalate privileges, or move laterally within the Azure environment. Detecting these anomalous role assignments is crucial for identifying potentially compromised accounts or malicious insiders. This activity is a common tactic used by attackers to establish persistence and maintain control over cloud resources. Monitoring for this behavior can help security teams quickly identify and respond to potential breaches, limiting the impact of successful attacks. This activity can be associated with lateral movement, privilege escalation, and persistence within the cloud environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised user account or service principal within the Azure environment.</li>
<li>The attacker attempts to identify existing privileged roles and permissions.</li>
<li>The attacker bypasses PIM to directly assign themselves a privileged role (e.g., Global Administrator, Security Administrator) using Azure CLI, PowerShell, or the Azure portal.</li>
<li>The attacker elevates their permissions without triggering PIM alerts or requiring approval.</li>
<li>The attacker uses the newly assigned privileged role to access sensitive data, modify configurations, or create new resources.</li>
<li>The attacker establishes persistence by creating new accounts or modifying existing ones with elevated privileges.</li>
<li>The attacker moves laterally to other Azure resources or subscriptions using their increased access.</li>
<li>The attacker achieves their final objective, such as data exfiltration, service disruption, or deployment of malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising privileged roles within Azure can have severe consequences, potentially impacting all resources within the affected Azure Active Directory tenant. Successful attacks can lead to unauthorized data access, service disruption, financial loss, and reputational damage. The scope of the impact depends on the level of privilege gained by the attacker and the sensitivity of the targeted resources. Without proper detection and response, organizations may remain unaware of the breach, allowing attackers to maintain persistent access and continue their malicious activities undetected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule <code>Roles Assigned Outside PIM</code> to your SIEM to detect unauthorized role assignments within your Azure environment.</li>
<li>Investigate all instances flagged by the Sigma rule <code>Roles Assigned Outside PIM</code> to determine the legitimacy of the role assignment and the identity of the assigner.</li>
<li>Implement controls to restrict the ability to assign privileged roles outside of PIM, as described in the Microsoft documentation reference.</li>
<li>Review and enforce the principle of least privilege to minimize the potential impact of compromised accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>role-assignment</category><category>attack.initial-access</category><category>attack.stealth</category><category>attack.t1078</category><category>attack.persistence</category><category>attack.privilege-escalation</category></item></channel></rss>