<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Gworkspace — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/gworkspace/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 26 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/gworkspace/feed.xml" rel="self" type="application/rss+xml"/><item><title>Google Workspace Suspicious Login Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-gworkspace-suspicious-login/</link><pubDate>Fri, 26 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-gworkspace-suspicious-login/</guid><description>Detect Google Workspace login activity that Google has classified as suspicious, potentially indicating initial access, privilege escalation, defense evasion, or persistence attempts.</description><content:encoded><![CDATA[<p>This brief focuses on detecting suspicious login activity within Google Workspace environments, as flagged by Google&rsquo;s internal risk assessment mechanisms. Google Workspace logs login events and classifies them based on various risk factors, including the use of less secure applications, programmatic logins, and other anomalies. This detection capability is crucial for identifying potential compromises, unauthorized access attempts, and malicious activities within the Google Workspace ecosystem. Analyzing these flagged events allows security teams to proactively respond to threats before they escalate, preventing data breaches and maintaining the integrity of sensitive information. This alert focuses on logins classified as &lsquo;suspicious_login_less_secure_app&rsquo;, &lsquo;suspicious_login&rsquo;, and &lsquo;suspicious_programmatic_login&rsquo;.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access using compromised credentials or brute-force techniques targeting Google Workspace accounts.</li>
<li><strong>Login Attempt:</strong> The attacker attempts to log in to a Google Workspace account using a less secure application (e.g., an older email client without modern authentication) or via programmatic login.</li>
<li><strong>Suspicious Activity Detection:</strong> Google&rsquo;s internal systems analyze the login attempt and flag it as suspicious based on various risk factors, such as unusual location, time of day, or login method.</li>
<li><strong>Event Logging:</strong> Google Workspace logs the suspicious login event, including the reason for the classification (e.g., &lsquo;suspicious_login_less_secure_app&rsquo;).</li>
<li><strong>Potential Privilege Escalation:</strong> Upon successful login, the attacker may attempt to escalate privileges within the Google Workspace environment to gain broader access.</li>
<li><strong>Defense Evasion:</strong> The attacker might use techniques to evade detection, such as disabling security features or modifying audit logs.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by creating new accounts, modifying existing ones, or installing malicious apps.</li>
<li><strong>Data Exfiltration/Malicious Activity:</strong> The attacker uses the compromised account to exfiltrate sensitive data or perform other malicious activities, such as sending phishing emails.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data stored within Google Workspace, including emails, documents, and other files. This can result in data breaches, financial loss, and reputational damage. The number of affected users depends on the scope of the compromised account and the attacker&rsquo;s ability to escalate privileges. Targeted sectors are broad, affecting any organization relying on Google Workspace for collaboration and data storage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious login activity classified by Google Workspace (logsource: <code>gcp</code>, service: <code>google_workspace.login</code>).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the login attempt and take appropriate action, such as resetting passwords or disabling compromised accounts.</li>
<li>Enforce multi-factor authentication (MFA) for all Google Workspace accounts to mitigate the risk of credential compromise.</li>
<li>Disable or restrict the use of less secure apps within Google Workspace to reduce the attack surface.</li>
<li>Monitor Google Workspace audit logs for other suspicious activities, such as unusual file access or data exfiltration attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>privilege-escalation</category><category>defense-evasion</category><category>persistence</category><category>gworkspace</category></item><item><title>Detection of Out-of-Domain Email Forwarding in Google Workspace</title><link>https://feed.craftedsignal.io/briefs/2024-01-gworkspace-email-forwarding/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gworkspace-email-forwarding/</guid><description>Detects automatic email forwarding to external domains in Google Workspace, which may indicate data leakage or misuse by malicious insiders or compromised accounts.</description><content:encoded><![CDATA[<p>This brief focuses on detecting unauthorized email forwarding to external domains within Google Workspace environments. The primary concern is the potential for data exfiltration or misuse by malicious insiders or threat actors who have compromised user accounts. The activity is logged by Google Workspace and can be monitored using the Google Workspace Admin Reports API. The event name associated with this activity is <code>email_forwarding_out_of_domain</code>, which is generated when a user configures automatic email forwarding to an address outside the organization&rsquo;s domain. Successful exploitation of this technique can lead to the leakage of sensitive information, intellectual property theft, or compliance violations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a Google Workspace user account, potentially through phishing, credential stuffing, or other methods.</li>
<li>The attacker navigates to the Gmail settings for the compromised account.</li>
<li>The attacker configures automatic email forwarding to an external email address controlled by the attacker (e.g., a Gmail, Outlook, or ProtonMail address).</li>
<li>The attacker sets up filters to forward specific types of emails, such as those containing sensitive keywords or originating from key personnel.</li>
<li>Legitimate emails are received by the compromised user and automatically forwarded to the external address.</li>
<li>The attacker collects the forwarded emails, extracting sensitive data or using it for further malicious activities.</li>
<li>The attacker covers their tracks by deleting audit logs or modifying forwarding rules.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of unauthorized email forwarding can lead to significant data breaches, intellectual property theft, and compliance violations. The impact can range from exposure of sensitive customer data to the loss of competitive advantage due to stolen trade secrets. Depending on the volume and nature of the data exfiltrated, organizations may face legal and regulatory penalties, as well as reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>email_forwarding_out_of_domain</code> events in Google Workspace logs (logsource: <code>gcp</code>, service: <code>google_workspace.login</code>).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the email forwarding configuration.</li>
<li>Implement multi-factor authentication (MFA) for all Google Workspace accounts to reduce the risk of account compromise.</li>
<li>Regularly review and audit email forwarding rules to identify and remove any unauthorized configurations.</li>
<li>Train users to recognize and report phishing attempts to prevent account compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>data-leakage</category><category>gworkspace</category><category>email-forwarding</category></item></channel></rss>