<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Azure Active Directory — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/azure-active-directory/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 Nov 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/azure-active-directory/feed.xml" rel="self" type="application/rss+xml"/><item><title>Microsoft 365 Identity Login from Impossible Travel Location</title><link>https://feed.craftedsignal.io/briefs/2024-11-m365-impossible-travel/</link><pubDate>Fri, 15 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-m365-impossible-travel/</guid><description>Detects successful Microsoft 365 portal logins from impossible travel locations, defined as logins originating from two different countries within a short time frame, potentially indicating account compromise or unauthorized access.</description><content:encoded><![CDATA[<p>This detection rule identifies Microsoft 365 login anomalies indicative of &ldquo;impossible travel,&rdquo; where a user account logs in from geographically disparate locations within a short timeframe. This behavior often signifies account compromise, with threat actors leveraging stolen credentials to access cloud resources from different countries. The rule focuses on successful Azure Active Directory logins and excludes specific application IDs and request types known to generate false positives. The premise is that legitimate user travel between distant countries is highly improbable within a brief time window. This detection is crucial for defenders to identify and respond to potential account takeovers promptly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker obtains valid credentials for a Microsoft 365 account, possibly through phishing, credential stuffing, or purchasing them on the dark web.</li>
<li>The attacker initiates a login to the Microsoft 365 portal from a location different from the legitimate user&rsquo;s typical location.</li>
<li>The user logs in successfully, generating an Azure Active Directory audit event with the &ldquo;UserLoggedIn&rdquo; action.</li>
<li>Within a short timeframe (e.g., 15 minutes), the attacker initiates another login from a different country.</li>
<li>The second login is also successful, generating another Azure Active Directory audit event with the &ldquo;UserLoggedIn&rdquo; action from a different geographical location.</li>
<li>The detection rule identifies the two login events originating from two different countries for the same user within the configured timeframe.</li>
<li>The attacker gains access to the compromised account and can access sensitive data, send phishing emails, or perform other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data within Microsoft 365, potentially resulting in data breaches, financial loss, and reputational damage. The number of affected users and the scale of the impact depends on the level of access granted to the compromised account. This attack targets any organization using Microsoft 365 for email, file storage, and other services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;M365 Identity Login from Impossible Travel Location&rdquo; to your SIEM to detect suspicious login activity.</li>
<li>Tune the timeframe in the Sigma rule to match your organization&rsquo;s risk tolerance and user travel patterns.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the user&rsquo;s login history, geographic locations, and other relevant factors as noted in the rule&rsquo;s documentation.</li>
<li>Consider implementing multi-factor authentication (MFA) for all users to mitigate the risk of account compromise, referenced in the provided documentation.</li>
<li>Regularly review and update the list of excluded Application IDs in the Sigma rule to prevent false positives, based on your specific environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>identity</category><category>microsoft 365</category><category>azure active directory</category><category>initial access</category></item></channel></rss>