<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Consent — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/consent/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/consent/feed.xml" rel="self" type="application/rss+xml"/><item><title>Azure AD Risk-Based Consent Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-01-azuread-consent-disable/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azuread-consent-disable/</guid><description>The analytic detects when the risk-based step-up consent security setting in Azure AD is disabled by monitoring Azure Active Directory logs for the 'Update authorization policy' operation and changes to the 'AllowUserConsentForRiskyApps' setting, potentially exposing organizations to OAuth phishing attacks.</description><content:encoded><![CDATA[<p>This detection identifies instances where the risk-based step-up consent feature in Azure Active Directory (Azure AD) is disabled. The feature, designed to mitigate OAuth phishing attacks by prompting users with extra verification steps when consenting to risky applications, is disabled when the &lsquo;AllowUserConsentForRiskyApps&rsquo; setting is set to &rsquo;true&rsquo;. Attackers can exploit this misconfiguration to trick users into granting malicious applications access to sensitive data. This activity is detected by analyzing Azure AD audit logs for the &ldquo;Update authorization policy&rdquo; operation, specifically looking for modifications to the &lsquo;AllowUserConsentForRiskyApps&rsquo; setting. Successful exploitation can lead to unauthorized access, data breaches, and further compromise within the organization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a target organization using Azure AD and seeks to compromise user accounts.</li>
<li>The attacker crafts a malicious OAuth application designed to harvest user credentials or gain access to sensitive data.</li>
<li>The attacker disables the &ldquo;risk-based step-up consent&rdquo; feature in the target Azure AD tenant by modifying the &lsquo;AllowUserConsentForRiskyApps&rsquo; setting to &rsquo;true&rsquo; via the &ldquo;Update authorization policy&rdquo; operation.</li>
<li>The attacker distributes the malicious OAuth application via phishing emails or other social engineering techniques.</li>
<li>Unsuspecting users click on the malicious link and are prompted to grant consent to the application without risk-based step-up verification.</li>
<li>Upon granting consent, the malicious application gains access to the user&rsquo;s data and resources within the Azure AD environment.</li>
<li>The attacker uses the compromised account to access sensitive information, escalate privileges, or move laterally within the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling the risk-based step-up consent feature in Azure AD can significantly increase the risk of successful OAuth phishing attacks. Successful exploitation could lead to unauthorized access to user data and sensitive information, leading to data breaches and further compromise within the organization. The number of affected users and the extent of data loss depend on the scope of the attack and the permissions granted to the malicious application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the provided Sigma rule to detect when the &lsquo;AllowUserConsentForRiskyApps&rsquo; setting is enabled, indicating the risk-based step-up consent feature has been disabled.</li>
<li>Review Azure AD audit logs for instances of the &ldquo;Update authorization policy&rdquo; operation that modify the &lsquo;AllowUserConsentForRiskyApps&rsquo; setting.</li>
<li>Investigate and validate any changes to the &lsquo;AllowUserConsentForRiskyApps&rsquo; setting to ensure they are authorized and legitimate.</li>
<li>Implement multi-factor authentication (MFA) for all users to reduce the risk of account compromise.</li>
<li>Educate users about the risks of OAuth phishing and how to identify suspicious applications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>oauth</category><category>consent</category><category>phishing</category></item></channel></rss>