<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Google-Workspace — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/google-workspace/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 10:29:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/google-workspace/feed.xml" rel="self" type="application/rss+xml"/><item><title>Google Workspace Device Registration After OAuth from Suspicious ASN</title><link>https://feed.craftedsignal.io/briefs/2026-05-google-workspace-device-registration/</link><pubDate>Mon, 18 May 2026 10:29:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-google-workspace-device-registration/</guid><description>Detects a sequence of events in Google Workspace where OAuth authorization from a suspicious ASN is immediately followed by device registration, potentially indicating attacker-controlled device enrollment after user authorization of a sensitive client, possibly related to Tycoon2FA.</description><content:encoded><![CDATA[<p>This detection identifies suspicious Google Workspace device registrations potentially linked to compromised accounts or malicious device enrollment. The rule focuses on detecting a specific sequence of events: a user authorizing a Google OAuth client from a high-risk Autonomous System Number (ASN), followed closely by a device registration event with the device&rsquo;s account state set to &ldquo;REGISTERED&rdquo;. The goal is to identify instances where attackers might be using compromised credentials or residential proxies to enroll devices into an organization&rsquo;s Google Workspace environment after gaining unauthorized OAuth access. This activity has been linked to threat actors such as Tycoon2FA and is further detailed in Elastic&rsquo;s Google Workspace attack surface research.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to user credentials through phishing (T1566.002) or other methods.</li>
<li>Attacker uses compromised credentials to initiate OAuth authorization for a sensitive Google OAuth client (client ID: 77185425430.apps.googleusercontent.com) from a high-risk ASN (e.g., 9009, 45102, 215540, 29802, 62240, 204957, 395092).</li>
<li>User unknowingly grants OAuth permissions to the malicious application.</li>
<li>Immediately following OAuth authorization, the attacker triggers a device registration event within Google Workspace.</li>
<li>The device registration event reports the account state as &ldquo;REGISTERED,&rdquo; indicating successful device enrollment.</li>
<li>The attacker can then potentially access sensitive data or perform actions as the user from the newly registered device.</li>
<li>The attacker leverages the registered device for persistence and lateral movement within the Google Workspace environment (T1098.005).</li>
<li>The final objective can include data exfiltration, business email compromise, or further compromise of other accounts and systems within the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive Google Workspace data, including emails, documents, and applications. This can result in data breaches, financial loss, and reputational damage. The attacker can potentially maintain persistence within the Google Workspace environment, allowing them to continue accessing and manipulating data over an extended period. This rule aims to detect early stages of this attack, potentially preventing a full compromise of the victim&rsquo;s Google Workspace account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious Google Workspace device registrations following OAuth authorization from high-risk ASNs. Tune the rule for your environment based on known VPNs and trusted ASNs.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing <code>user.name</code>, <code>user.email</code>, <code>source.ip</code>, <code>source.as.organization.name</code>, and <code>google_workspace.token.client.id</code> from the logs.</li>
<li>Review and restrict OAuth app access policies within Google Workspace to prevent unauthorized applications from gaining access to sensitive data.</li>
<li>Monitor Google Workspace <code>google_workspace.token</code> and <code>google_workspace.device</code> audit streams as mentioned in the setup section to ingest relevant events.</li>
<li>Consider increasing the <code>from</code> field to account for Google Workspace event lag, as suggested in the documentation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>google-workspace</category><category>persistence</category><category>initial-access</category><category>tycoon2fa</category></item></channel></rss>