<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Guest-User — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/guest-user/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/guest-user/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unauthorized Guest User Invitations in Azure AD</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-azuread-guest-invite/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-azuread-guest-invite/</guid><description>Detection of unauthorized guest user invitations within an Azure Active Directory tenant, indicating potential privilege escalation, persistence, or initial access attempts.</description><content:encoded><![CDATA[<p>This alert focuses on detecting the invitation of guest users to an Azure Active Directory (AD) tenant by accounts that are not pre-approved to perform this action. Unauthorized guest user invitations can be an indicator of various malicious activities. An attacker could be attempting to escalate privileges by adding an account they control, establish persistence by creating a backdoor account, or gain initial access to the environment. This activity might be part of a broader attack aimed at gaining unauthorized access to sensitive resources or data within the organization&rsquo;s Azure environment. It is important to ensure that only authorized personnel can invite external users to maintain security and prevent potential abuse.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a low-privilege user account within the Azure AD tenant or uses existing compromised credentials.</li>
<li>The attacker attempts to invite an external guest user to the tenant using the compromised account.</li>
<li>The Azure AD audit logs record the &ldquo;Invite external user&rdquo; operation under the UserManagement category.</li>
<li>The audit log event is generated, capturing details such as the user who initiated the invitation (InitiatedBy) and the target guest user&rsquo;s information.</li>
<li>The detection logic evaluates if the InitiatedBy user is within the list of approved guest inviters.</li>
<li>If the inviting user is not on the approved list, the detection rule triggers, indicating a potentially unauthorized guest invitation.</li>
<li>The attacker may then attempt to leverage the newly invited guest account for lateral movement or data exfiltration.</li>
<li>The attacker uses the guest account to access resources and data within the Azure AD environment, potentially leading to data breaches or other security incidents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of this vulnerability can lead to unauthorized access to sensitive data and resources within the Azure AD tenant. While the precise number of potential victims is unknown, the impact could range from a limited breach affecting a small set of resources to a widespread compromise impacting the entire organization. The addition of unauthorized guest accounts can facilitate lateral movement, data exfiltration, and other malicious activities, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule to detect unauthorized guest user invitations in Azure AD audit logs and tune the <code>filter</code> with a list of approved inviters.</li>
<li>Review and restrict the number of users authorized to invite guest users to the Azure AD tenant based on business needs.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, including guest accounts, to prevent unauthorized access (related to audit logs).</li>
<li>Regularly audit Azure AD logs for any suspicious activity related to user management (related to audit logs).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azuread</category><category>guest-user</category><category>privilege-escalation</category><category>persistence</category><category>initial-access</category></item></channel></rss>