<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Entra_id — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/entra_id/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 18:43:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/entra_id/feed.xml" rel="self" type="application/rss+xml"/><item><title>Entra ID Excessive Account Lockouts Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-entra-id-lockouts/</link><pubDate>Wed, 22 Apr 2026 18:43:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-entra-id-lockouts/</guid><description>A high volume of failed Microsoft Entra ID sign-in attempts resulting in account lockouts indicates potential brute-force attacks, such as password spraying or credential stuffing, targeting user accounts.</description><content:encoded><![CDATA[<p>This alert identifies a surge in failed Microsoft Entra ID sign-in attempts (error code 50053) due to account lockouts, suggesting potential brute-force attacks. Attackers often employ password spraying, credential stuffing, or automated guessing to compromise accounts. This detection uses a threshold-based approach to identify coordinated campaigns targeting multiple users. The Entra ID Smart Lockout feature triggers error code 50053, utilizing IP-based tracking to differentiate between &ldquo;familiar&rdquo; and &ldquo;unfamiliar&rdquo; locations, with lockouts primarily originating from unfamiliar IPs. Successful exploitation can lead to unauthorized access to sensitive data, lateral movement within the network, and potential data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker attempts to gain access to Entra ID accounts using compromised or guessed credentials.</li>
<li><strong>Password Spraying/Credential Stuffing:</strong> The attacker performs password spraying attacks by attempting common passwords across multiple accounts, or credential stuffing attacks by using lists of breached credentials obtained from other sources.</li>
<li><strong>Authentication Failure:</strong> The sign-in attempts fail due to incorrect credentials, resulting in authentication failure events in Entra ID sign-in logs.</li>
<li><strong>Smart Lockout Triggered:</strong> Entra ID&rsquo;s Smart Lockout feature detects the repeated failed sign-in attempts from unfamiliar IPs, triggering account lockouts and generating error code 50053.</li>
<li><strong>Account Lockout:</strong> The target user accounts are locked out, preventing legitimate users from accessing their accounts.</li>
<li><strong>Potential Enumeration:</strong> Prior to the lockouts, the attacker may perform username enumeration, resulting in error code 50034 (user not found) in the sign-in logs.</li>
<li><strong>MFA Bypass Attempt (if applicable):</strong> If MFA is not enforced or bypassed, the attacker may attempt to gain access using single-factor authentication.</li>
<li><strong>Account Compromise (if successful):</strong> If the attacker successfully guesses the password before lockout or bypasses MFA, the account is compromised, allowing unauthorized access to resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful brute-force attack against Entra ID can lead to widespread account compromise. This could result in unauthorized access to sensitive data, business disruption, and potential financial loss. An attacker could leverage compromised accounts to move laterally within the network, escalate privileges, and exfiltrate data. This attack can affect any organization using Microsoft Entra ID for identity and access management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Entra ID Excessive Account Lockouts Detected&rdquo; to your SIEM to detect high counts of failed sign-in attempts resulting in account lockouts.</li>
<li>Investigate alerts generated by the Sigma rule by pivoting to the raw logs in Discover or Timeline using the provided query and focusing on <code>event.dataset: &quot;azure.signinlogs&quot; and azure.signinlogs.properties.status.error_code: 50053</code>.</li>
<li>Block suspicious source IPs identified in the investigation using Conditional Access named locations to prevent further brute-force attempts.</li>
<li>Implement Conditional Access policies to block legacy authentication protocols like IMAP, SMTP, and POP, which are often targeted in password spraying attacks.</li>
<li>Review and enhance Conditional Access policies to ensure comprehensive MFA coverage and prevent MFA bypass attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>entra_id</category><category>credential_access</category><category>brute_force</category></item><item><title>Entra ID ADRS Token Request by Microsoft Authentication Broker</title><link>https://feed.craftedsignal.io/briefs/2026-06-adrs-token-request/</link><pubDate>Fri, 10 Apr 2026 17:57:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-adrs-token-request/</guid><description>Detects suspicious OAuth 2.0 token requests where the Microsoft Authentication Broker requests access to the Device Registration Service on behalf of a user principal, potentially indicating an attempt to abuse device registration for unauthorized persistence.</description><content:encoded><![CDATA[<p>This detection identifies potentially malicious activity within Microsoft Entra ID (Azure AD) involving the Microsoft Authentication Broker (MAB). Specifically, it focuses on OAuth 2.0 token requests where MAB (application ID 29d9ed98-a469-4536-ade2-f981bc1d605e) requests access to the Device Registration Service (DRS) (resource ID 01cb2876-7ebd-4aa4-9cc9-d28bd4d359a9) on behalf of a user. The presence of the <code>adrs_access</code> scope within the authentication processing details signals an attempt to interact with the ADRS (Azure Device Registration Service), an action not typically associated with standard user sign-ins. This behavior could indicate an attacker attempting to abuse device registration mechanisms to achieve persistence, such as acquiring a Primary Refresh Token (PRT) or establishing a trusted session. The Volexity report from April 2025 highlights similar OAuth workflow targeting.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises user credentials through phishing or other means.</li>
<li>Attacker leverages the compromised credentials to initiate an OAuth 2.0 authentication flow.</li>
<li>The Microsoft Authentication Broker is used to request an access token.</li>
<li>The request targets the Device Registration Service (DRS) with resource ID 01cb2876-7ebd-4aa4-9cc9-d28bd4d359a9.</li>
<li>The OAuth scope includes <code>adrs_access</code>, indicating an attempt to access ADRS functionalities.</li>
<li>The request is made using a refresh token, suggesting an attempt to establish persistent access.</li>
<li>Successful token acquisition allows the attacker to manipulate device registration or acquire a Primary Refresh Token (PRT).</li>
<li>The attacker uses the PRT or device registration to maintain unauthorized access to resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could allow an attacker to maintain persistent access to an organization&rsquo;s cloud resources, even after a user changes their password or is removed from the organization. This can lead to data exfiltration, lateral movement, and further compromise of sensitive information. The number of potentially affected users depends on the scope of the initial compromise and the effectiveness of the attacker&rsquo;s persistence mechanisms. This attack targets any organization using Microsoft Entra ID.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Entra ID ADRS Token Request by Microsoft Authentication Broker&rdquo; to your SIEM and tune it for your environment to detect suspicious ADRS access attempts.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the user principal and the origin of the request.</li>
<li>Review Conditional Access policies to ensure they are sufficient to prevent unauthorized access to sensitive resources.</li>
<li>Monitor Entra ID audit logs for device registrations or changes to user&rsquo;s device registration status as suggested in the rule&rsquo;s triage steps.</li>
<li>Correlate with primary refresh token (PRTs) usage for the same user and/or session ID to identify any potential abuse, as mentioned in the rule&rsquo;s triage.</li>
<li>Consider adjusting the rule or adding exceptions for specific applications or user accounts that legitimately require access to the Device Registration Service, based on false positive analysis.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>entra_id</category><category>persistence</category><category>oauth</category></item><item><title>Entra ID Federated Identity Credential Issuer Modified</title><link>https://feed.craftedsignal.io/briefs/2026-03-entra-id-federated-issuer-modified/</link><pubDate>Wed, 18 Mar 2026 21:22:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-entra-id-federated-issuer-modified/</guid><description>Modification of the issuer URL of a federated identity credential in Entra ID can allow an attacker to authenticate as the application's service principal, granting persistent access to Azure resources by pointing to an attacker-controlled identity provider and bypassing normal authentication.</description><content:encoded><![CDATA[<p>This detection identifies modifications to the issuer URL within a federated identity credential on an Entra ID application. Federated identity credentials enable applications to authenticate using tokens from external identity providers (e.g., GitHub Actions, AWS) without managing secrets. An attacker can exploit this by changing the issuer to an attacker-controlled identity provider, enabling them to generate valid tokens and authenticate as the application&rsquo;s service principal. This technique provides persistent access to Azure resources with the application&rsquo;s permissions, effectively bypassing traditional secret-based authentication. The detection logic focuses on the &ldquo;Update application&rdquo; event within Entra ID audit logs, specifically targeting changes to the &ldquo;FederatedIdentityCredentials&rdquo; property. It is applicable to environments using Azure and Entra ID and is relevant for defenders aiming to prevent unauthorized access and maintain the integrity of their cloud infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises an Entra ID account with sufficient privileges to modify application registrations.</li>
<li>The attacker navigates to the Entra ID portal or uses PowerShell/Azure CLI to locate a target application with federated identity credentials configured.</li>
<li>The attacker modifies the &ldquo;Issuer&rdquo; URL of an existing Federated Identity Credential within the application registration. They replace the legitimate issuer URL with a URL controlled by the attacker.</li>
<li>The attacker configures their own identity provider to issue tokens that match the application&rsquo;s expected audience and subject claims.</li>
<li>The attacker crafts a malicious token from their identity provider, impersonating the legitimate service principal.</li>
<li>The attacker uses the crafted token to authenticate to Azure resources, bypassing normal authentication controls.</li>
<li>The attacker leverages the application&rsquo;s permissions to access sensitive data, modify configurations, or deploy malicious code.</li>
<li>The attacker maintains persistent access to the Azure environment by continuing to use the compromised federated identity configuration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to gain persistent access to Azure resources with the permissions of the compromised application. This could lead to data breaches, unauthorized modifications to critical infrastructure, and deployment of malicious code within the cloud environment. The impact is significant because it bypasses traditional authentication methods and relies on a trust relationship established with an external identity provider. The rule is rated high severity because it directly addresses a persistence and privilege escalation technique that can severely impact the confidentiality, integrity, and availability of cloud resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the Azure integration with Microsoft Entra ID Audit Logs data stream to ingest data in your Elastic Stack deployment, as required by the rule setup instructions.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized modifications to federated identity credential issuers in Entra ID (<code>Entra ID Federated Identity Credential Issuer Modified</code>).</li>
<li>Review <code>azure.auditlogs.properties.initiated_by.user.userPrincipalName</code> and <code>ipAddress</code> logs to determine the source of detected changes, as recommended in the rule&rsquo;s triage notes.</li>
<li>Implement conditional access policies and PIM (Privileged Identity Management) to protect application management operations within Entra ID, as suggested in the rule&rsquo;s response and remediation guidance.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>entra_id</category><category>federated_identity</category><category>persistence</category><category>privilege_escalation</category></item></channel></rss>