<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Azure-Ad — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/azure-ad/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 15:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/azure-ad/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of ConvertTo-AADIntBackdoor Execution via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-aadintbackdoor/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aadintbackdoor/</guid><description>This brief outlines the detection of the ConvertTo-AADIntBackdoor command execution via PowerShell Script Block Logging, a technique used to create a backdoor in federated Azure AD domains by modifying federation settings and allowing attackers to control the authentication process.</description><content:encoded><![CDATA[<p>The ConvertTo-AADIntBackdoor command is a component of the AADInternals toolkit, designed for security testing and administrative functions within Azure Active Directory (Azure AD) environments. When executed, this command manipulates the federation settings of a domain, adding or altering the federation configuration to grant attackers control over the authentication procedure. This allows for the forging of security tokens, enabling impersonation of any user within the Azure AD tenant. Such manipulation allows attackers to bypass Multi-Factor Authentication (MFA), escalate privileges, and establish persistent access to the Azure AD environment. Defenders should monitor PowerShell Script Block Logging for this activity, as it poses a significant risk to Azure AD environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system with privileges to execute PowerShell scripts.</li>
<li>Attacker executes a PowerShell script containing the <code>ConvertTo-AADIntBackdoor</code> command.</li>
<li>The <code>ConvertTo-AADIntBackdoor</code> command modifies the federation settings of an Azure AD domain.</li>
<li>The federation configuration is altered to allow the attacker to control the authentication process.</li>
<li>The attacker can now create security tokens to impersonate any user within the Azure AD tenant.</li>
<li>Multi-Factor Authentication (MFA) is bypassed using the forged security tokens.</li>
<li>The attacker escalates privileges within the Azure AD environment.</li>
<li>The attacker maintains persistent access to the Azure AD environment, potentially exfiltrating data or causing further damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of the <code>ConvertTo-AADIntBackdoor</code> command allows attackers to gain persistent, unauthorized access to Azure AD environments, bypass MFA, and escalate privileges. This can lead to significant data breaches, service disruption, and reputational damage. The scope of impact is tenant-wide, potentially affecting all users and resources within the Azure AD environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor PowerShell Script Block Logging (Event ID 4104) to detect the execution of suspicious commands, as outlined in the overview.</li>
<li>Deploy the Sigma rule provided to detect the execution of <code>ConvertTo-AADIntBackdoor</code> in PowerShell scripts and tune for your environment.</li>
<li>Review and audit Azure AD federation settings regularly to identify any unauthorized modifications.</li>
<li>Implement strict access controls and monitoring for accounts with permissions to modify Azure AD federation settings.</li>
<li>Investigate any alerts generated by the provided Sigma rule, prioritizing incidents involving privileged accounts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>azure-ad</category><category>backdoor</category><category>powershell</category><category>persistence</category><category>privilege-escalation</category></item></channel></rss>