<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft_entra_id — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/microsoft_entra_id/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 10:04:24 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/microsoft_entra_id/feed.xml" rel="self" type="application/rss+xml"/><item><title>Entra ID Microsoft Authentication Broker Sign-In to Unusual Resource</title><link>https://feed.craftedsignal.io/briefs/2026-05-entra-id-auth-broker-unusual-resource/</link><pubDate>Mon, 18 May 2026 10:04:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-entra-id-auth-broker-unusual-resource/</guid><description>Detects successful Microsoft Entra ID sign-ins where the client application is the Microsoft Authentication Broker (MAB) and the requested resource identifier is outside a short list of commonly observed first-party targets, potentially indicating abuse to obtain tokens for unexpected APIs or enterprise applications.</description><content:encoded><![CDATA[<p>Attackers are increasingly abusing the Microsoft Authentication Broker (MAB) in phishing and token broker flows to gain unauthorized access to Entra ID resources. This involves manipulating the broker to request tokens for APIs or enterprise applications that are not part of the expected first-party targets. This technique allows attackers to bypass traditional authentication controls and gain access to sensitive data or services. This activity is notable because legitimate use of MAB should typically target a limited set of Microsoft services like Azure Active Directory, Microsoft Graph, Device Registration Service, and Microsoft Intune Enrollment. This detection rule focuses on identifying sign-in attempts where MAB is used to access resources outside of this expected scope.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a user&rsquo;s credentials or session.</li>
<li>The attacker initiates a sign-in request using the Microsoft Authentication Broker (MAB). The MAB client application ID is 29d9ed98-a469-4536-ade2-f981bc1d605e.</li>
<li>The attacker crafts the request to target a resource identifier outside the typical first-party Microsoft services (e.g., an unusual API or enterprise application).</li>
<li>The MAB validates the user&rsquo;s identity.</li>
<li>If successful, the MAB issues an access token for the requested resource.</li>
<li>The attacker uses the acquired access token to access the targeted resource, potentially gaining unauthorized access to data or services.</li>
<li>The attacker performs malicious actions, such as data exfiltration or privilege escalation, within the compromised resource.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, compromised user accounts, and potential data breaches. Attackers can use the access tokens obtained through this method to perform a wide range of malicious activities, including data exfiltration, lateral movement, and privilege escalation within the Entra ID environment. The scope of the impact depends on the permissions and access levels associated with the compromised user account and the targeted resource.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Microsoft Entra ID sign-in logs (<code>logs-azure.signinlogs-*</code>) and ensure they include <code>azure.signinlogs.properties.app_id</code> and <code>azure.signinlogs.properties.resource_id</code> as mentioned in the setup instructions.</li>
<li>Deploy the Sigma rule &ldquo;Entra ID Microsoft Authentication Broker Sign-In to Unusual Resource&rdquo; to your SIEM to detect suspicious sign-in attempts. Tune the exclusion list for first-party resource identifiers your tenant expects from the Microsoft Authentication Broker (MAB).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on <code>azure.signinlogs.properties.user_principal_name</code>, <code>azure.signinlogs.properties.resource_id</code>, <code>azure.signinlogs.properties.resource_display_name</code>, <code>azure.signinlogs.properties.session_id</code>, <code>source.ip</code>, and <code>user_agent.original</code>.</li>
<li>Review conditional access policies and risk detections for users exhibiting this behavior as described in the Triage section of this brief.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>identity</category><category>azure</category><category>entra_id</category><category>microsoft_entra_id</category><category>sign_in_logs</category><category>threat_detection</category><category>initial_access</category></item></channel></rss>