<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Federation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/federation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/federation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Azure Domain Federation Settings Modified</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-federation-modification/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-federation-modification/</guid><description>An attacker may modify Azure domain federation settings to establish persistence, escalate privileges, or gain unauthorized access to resources.</description><content:encoded><![CDATA[<p>Attackers can modify federation settings on Azure domains to gain unauthorized access and establish persistence. This involves manipulating the trust relationships between the Azure Active Directory and external identity providers. By altering these settings, an attacker can potentially bypass normal authentication mechanisms, assume identities, and maintain a foothold within the environment. This activity is typically carried out by users or applications with administrative privileges, making it crucial to monitor and validate any changes made to the federation settings. Detecting such modifications can be challenging due to the legitimate use of these settings by system administrators. This activity falls under tactics such as privilege escalation, persistence, initial access, and stealth.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an account with sufficient privileges to manage Azure Active Directory settings, such as a Global Administrator or Privileged Role Administrator.</li>
<li>The attacker authenticates to the Azure portal or uses PowerShell/CLI to interact with Azure resources.</li>
<li>The attacker enumerates existing domain federation settings to understand the current configuration and identify potential targets for modification.</li>
<li>The attacker modifies the federation settings on the domain using commands like <code>Set-MsolDomainFederationSettings</code> or through the Azure portal interface. This may involve altering the trusted certificate, changing the issuer URI, or modifying other federation parameters.</li>
<li>The attacker tests the modified federation settings to ensure they can successfully authenticate using the altered configuration.</li>
<li>The attacker leverages the modified federation settings to impersonate users or applications, gaining unauthorized access to protected resources and services.</li>
<li>The attacker establishes persistence by creating backdoors or alternate authentication methods using the modified federation settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of Azure domain federation settings can lead to significant consequences, including unauthorized access to sensitive data, privilege escalation, and long-term persistence within the Azure environment. Attackers could potentially compromise entire domains, impacting all users and applications relying on the affected Azure Active Directory. This can result in data breaches, service disruptions, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule &ldquo;Azure Domain Federation Settings Modified&rdquo; to detect suspicious modifications to federation settings in Azure audit logs.</li>
<li>Regularly review and validate changes to Azure domain federation settings, focusing on unfamiliar users and unexpected modifications.</li>
<li>Monitor Azure audit logs for the &ldquo;Set federation settings on domain&rdquo; event to identify potential tampering.</li>
<li>Enforce multi-factor authentication (MFA) for all accounts with administrative privileges to reduce the risk of unauthorized access.</li>
<li>Implement the principle of least privilege, granting users only the necessary permissions to perform their tasks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>federation</category><category>privilege-escalation</category><category>persistence</category><category>initial-access</category></item></channel></rss>