<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Pim — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/pim/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 22 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/pim/feed.xml" rel="self" type="application/rss+xml"/><item><title>Azure Privileged Identity Management (PIM) Invalid License Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-invalid-pim-license/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-invalid-pim-license/</guid><description>Detection of unauthorized access or privilege escalation attempts within Azure environments due to invalid or missing Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses for Privileged Identity Management (PIM).</description><content:encoded><![CDATA[<p>This alert identifies scenarios where an organization lacks the necessary Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses required for proper Privileged Identity Management (PIM) functionality. Attackers may attempt to exploit misconfigured or unlicensed PIM deployments to gain unauthorized privileged access to critical Azure resources. This detection is crucial as it indicates a compliance issue that can be leveraged to escalate privileges, bypass security controls, and potentially lead to data breaches or system compromise. The absence of appropriate licensing hinders the effectiveness of PIM controls, creating opportunities for malicious actors to operate undetected. Defenders need to ensure appropriate licenses are in place.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Azure environment lacking a valid Microsoft Entra Premium P2 or Microsoft Entra ID Governance license for Privileged Identity Management (PIM).</li>
<li>The attacker attempts to activate a privileged role within the Azure environment through PIM.</li>
<li>Due to the invalid license, the PIM activation process may not enforce proper multi-factor authentication (MFA) or approval workflows.</li>
<li>The attacker gains unauthorized access to the privileged role without proper authorization or auditing.</li>
<li>The attacker leverages the compromised privileged role to access sensitive Azure resources, such as virtual machines, databases, or storage accounts.</li>
<li>The attacker performs malicious actions, such as data exfiltration, modification of system configurations, or deployment of malware.</li>
<li>The attacker attempts to establish persistence within the Azure environment by creating rogue user accounts or modifying existing access controls.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of an invalid PIM license can be severe. Organizations may experience unauthorized access to critical Azure resources, leading to data breaches, system compromise, and compliance violations. The absence of proper PIM controls can enable attackers to escalate privileges, bypass security measures, and operate undetected within the Azure environment. Identifying invalid PIM licenses is crucial for maintaining the security and integrity of Azure deployments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>invalidLicenseAlertIncident</code> events in Azure PIM logs (logsource: azure, service: pim).</li>
<li>Investigate any detected instances of <code>invalidLicenseAlertIncident</code> to determine the scope of the issue and potential unauthorized access.</li>
<li>Verify that all Azure subscriptions utilizing PIM have valid Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses.</li>
<li>Implement automated monitoring to proactively identify and alert on invalid PIM licenses.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>privileged-identity-management</category><category>invalid-license</category></item><item><title>Azure PIM Account Stale Sign-in Alert</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-stale-account/</link><pubDate>Wed, 03 Jan 2024 18:42:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-stale-account/</guid><description>Detection of stale accounts in Azure Privileged Identity Management (PIM) through the 'staleSignInAlertIncident' event, indicating potential compromised or unused privileged accounts.</description><content:encoded><![CDATA[<p>The &ldquo;staleSignInAlertIncident&rdquo; event in Azure Privileged Identity Management (PIM) signifies that an account assigned a privileged role has not signed in for a prolonged period. This alert is crucial for defenders because inactive privileged accounts can become attractive targets for attackers. If an account is compromised and not actively used, the breach can go unnoticed for an extended time, increasing the attacker&rsquo;s dwell time and potential for lateral movement or data exfiltration. Monitoring for this event allows organizations to identify potentially compromised accounts and enforce stricter security measures like password resets, MFA enforcement, or temporary role revocation. The alert helps maintain a secure privileged access environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an organization using Azure PIM.</li>
<li>The attacker compromises a user account that is assigned a privileged role, but is currently inactive, using techniques such as password spraying or phishing.</li>
<li>Due to the account&rsquo;s inactivity, the compromise remains unnoticed by the legitimate owner or security monitoring tools.</li>
<li>The attacker activates the privileged role assignment in Azure PIM, granting them elevated permissions within the Azure environment.</li>
<li>The attacker leverages the elevated privileges to perform reconnaissance, identify valuable assets, and potentially create new administrative accounts.</li>
<li>The attacker moves laterally within the Azure environment, accessing sensitive data and resources that are normally restricted.</li>
<li>The attacker exfiltrates sensitive data or deploys malicious code to disrupt services.</li>
<li>The attacker maintains persistence by creating backdoors or modifying access controls to ensure continued access even after the initial compromise is detected.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised stale accounts in Azure PIM can lead to significant data breaches, service disruptions, and reputational damage. Attackers can leverage the elevated privileges associated with these accounts to gain unauthorized access to critical resources, exfiltrate sensitive data, or deploy ransomware. The impact can range from data loss to complete system compromise, depending on the scope of the privileged roles assigned to the stale account. The financial implications can be substantial, including regulatory fines, incident response costs, and lost revenue.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect <code>staleSignInAlertIncident</code> events in your Azure PIM logs, enabling rapid identification of potentially compromised stale accounts.</li>
<li>Investigate any triggered alerts to determine the legitimacy of the account&rsquo;s inactivity and potential compromise scenarios.</li>
<li>Implement automated workflows to disable or remove privileged role assignments for accounts that trigger the <code>staleSignInAlertIncident</code> event.</li>
<li>Review and enforce strong password policies and multi-factor authentication (MFA) for all accounts with privileged roles in Azure PIM.</li>
<li>Implement regular access reviews to identify and remove unnecessary privileged role assignments, minimizing the attack surface.</li>
<li>Consult Microsoft&rsquo;s documentation on configuring security alerts for potential stale accounts in privileged roles to understand the context and recommended actions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>stale_account</category></item><item><title>Azure PIM Elevation Approved or Denied</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-elevation/</link><pubDate>Wed, 03 Jan 2024 18:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-elevation/</guid><description>Detection of Azure Privileged Identity Management (PIM) elevation approvals or denials, which, if unexpected, may indicate unauthorized privilege escalation or malicious activity within an Azure environment.</description><content:encoded><![CDATA[<p>The compromise of privileged accounts within cloud environments is a significant risk. Azure Privileged Identity Management (PIM) is designed to mitigate this risk by enforcing time-bound and approval-based role activation. This brief focuses on the detection of PIM elevation requests that are either approved or denied. While legitimate administrator actions will trigger these events, unexpected or unauthorized approvals/denials, especially those occurring outside of normal business hours or originating from unusual locations, warrant immediate investigation. This activity can indicate attempts at unauthorized privilege escalation, lateral movement, or data exfiltration within the Azure environment. Monitoring these events provides an opportunity to identify and respond to potential breaches before significant damage can occur.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a low-privileged Azure account, possibly through credential phishing or password reuse.</li>
<li>The attacker attempts to activate a privileged role (e.g., Global Administrator, Security Administrator) through Azure PIM.</li>
<li>The PIM request triggers an approval workflow, requiring authorization from designated approvers.</li>
<li>An attacker compromises an approver account, enabling them to approve their own malicious PIM request or deny a legitimate one.</li>
<li>Alternatively, an unwitting approver approves a malicious request, potentially due to social engineering.</li>
<li>Upon approval, the attacker&rsquo;s account is temporarily elevated to the requested privileged role.</li>
<li>The attacker leverages the elevated privileges to perform malicious actions, such as creating new accounts, modifying security policies, or accessing sensitive data.</li>
<li>The attacker attempts to maintain persistence by creating backdoor accounts or modifying access controls, potentially circumventing PIM restrictions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to full control over the Azure environment, potentially impacting hundreds or thousands of users and services. A compromised Global Administrator role grants the attacker the ability to access and modify all resources within the Azure tenant, leading to data breaches, service disruptions, and financial losses. The targeted sectors include any organization leveraging Azure PIM for privileged access management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Azure PIM Elevation Approved or Denied</code> to your SIEM to detect unusual PIM activity.</li>
<li>Investigate any PIM approval or denial events occurring outside of normal business hours or originating from unexpected locations, focusing on the <code>properties.message</code> field in the logs.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts, especially those with approval permissions for PIM requests.</li>
<li>Regularly review and audit PIM role assignments and approval workflows to ensure they align with the principle of least privilege.</li>
<li>Enable alerting on changes to PIM policies and configurations to detect any unauthorized modifications.</li>
<li>Monitor Azure Audit Logs for suspicious activity following PIM role activation, looking for actions associated with common attack techniques (e.g., account creation, policy modification).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Azure PIM Role Activation Without MFA</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-no-mfa/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-no-mfa/</guid><description>Detection of Azure Privileged Identity Management (PIM) roles being activated without requiring multi-factor authentication, potentially leading to unauthorized privilege escalation and persistence.</description><content:encoded><![CDATA[<p>The absence of multi-factor authentication (MFA) during the activation of privileged roles in Azure Privileged Identity Management (PIM) poses a significant security risk. When roles can be activated without MFA, attackers who have already compromised a user account can escalate their privileges without needing to bypass an MFA challenge. This scenario circumvents a critical security control, making the environment vulnerable to lateral movement, data exfiltration, and other malicious activities. This brief is based on Sigma rule 94a66f46-5b64-46ce-80b2-75dcbe627cc0, published on 2023-09-14. Defenders need to monitor PIM configurations to ensure that MFA is enforced for all privileged role activations, mitigating the risk of unauthorized access and privilege escalation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a user account, potentially through phishing or credential stuffing.</li>
<li>The attacker identifies a privileged role within Azure PIM that the compromised user is eligible to activate.</li>
<li>The attacker attempts to activate the privileged role using the compromised user&rsquo;s credentials.</li>
<li>Due to misconfiguration, MFA is not required for the role activation process.</li>
<li>The attacker successfully activates the privileged role without providing a second factor of authentication.</li>
<li>The attacker leverages the newly acquired privileges to access sensitive resources and data within the Azure environment.</li>
<li>The attacker performs malicious actions such as creating new accounts, modifying configurations, or exfiltrating data.</li>
<li>The attacker establishes persistence by creating backdoors or modifying access control policies.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The absence of MFA during PIM role activation can lead to significant damage, potentially affecting all resources within the Azure environment accessible to the compromised privileged role. Successful exploitation allows attackers to bypass a critical security control, leading to privilege escalation, data breaches, and system compromise. The impact spans data confidentiality, integrity, and availability, and could result in regulatory fines, reputational damage, and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Roles Activation Doesn&rsquo;t Require MFA&rdquo; to your SIEM and tune for your environment to detect instances where privileged roles are activated without MFA based on <code>riskEventType: 'noMfaOnRoleActivationAlertIncident'</code> in Azure PIM logs.</li>
<li>Review and enforce MFA policies for all privileged role activations within Azure PIM, as recommended in the Microsoft documentation (<a href="https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#roles-dont-require-multi-factor-authentication-for-activation">https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#roles-dont-require-multi-factor-authentication-for-activation</a>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>mfa</category><category>privilege-escalation</category></item><item><title>Excessive Global Administrator Accounts in Azure PIM</title><link>https://feed.craftedsignal.io/briefs/2024-01-too-many-global-admins/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-too-many-global-admins/</guid><description>Detection of an excessive number of Global Administrator accounts assigned within an Azure tenant, indicating potential privilege escalation or compromised accounts.</description><content:encoded><![CDATA[<p>The presence of an excessive number of Global Administrator accounts in an Azure tenant poses a significant security risk. While the source does not attribute this activity to a specific threat actor, the risk event indicates a potential compromise of existing accounts, internal privilege abuse, or misconfiguration within the Azure environment. The alert triggers when the number of Global Administrator assignments exceeds a predefined threshold within Privileged Identity Management (PIM). Attackers may abuse highly privileged accounts to gain broad control over the Azure environment, deploy malicious workloads, exfiltrate data, or establish persistence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker compromises a low-privilege user account through phishing or credential stuffing.</li>
<li><strong>Privilege Escalation:</strong> The attacker attempts to elevate privileges by exploiting misconfigured permissions or vulnerabilities within the Azure environment.</li>
<li><strong>Global Admin Role Assignment:</strong> The attacker assigns the Global Administrator role to multiple accounts, including the compromised account, either directly or through PIM bypass.</li>
<li><strong>Lateral Movement:</strong> With Global Administrator privileges, the attacker moves laterally within the Azure environment, accessing sensitive resources and data.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrates sensitive data from cloud storage, databases, or virtual machines.</li>
<li><strong>Persistence:</strong> The attacker establishes persistent access by creating backdoors, modifying access controls, or deploying rogue applications.</li>
<li><strong>Covering Tracks:</strong> The attacker attempts to remove audit logs or disable security features to hide their activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of Global Administrator accounts can lead to significant damage, including data breaches, financial loss, and reputational damage. Excessive admin accounts significantly widen the attack surface and increase the likelihood of successful attacks. The impact includes unauthorized access to sensitive data, disruption of business operations, and potential regulatory fines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Too Many Global Admins&rdquo; to your SIEM and tune the threshold for your environment to detect excessive Global Administrator assignments in Azure PIM.</li>
<li>Review and reduce the number of Global Administrator accounts to the minimum necessary.</li>
<li>Implement multi-factor authentication (MFA) for all privileged accounts.</li>
<li>Monitor Azure audit logs for suspicious activity related to role assignments and privilege elevation.</li>
<li>Regularly review and update PIM policies to ensure appropriate access controls.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>global_admin</category><category>privilege_escalation</category></item><item><title>Detection of Privileged Identity Management (PIM) Settings Modifications</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-pim-settings-change/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-pim-settings-change/</guid><description>Detects unauthorized or malicious modifications to Privileged Identity Management (PIM) settings within Azure environments, potentially leading to privilege escalation, persistence, and stealthy access by attackers.</description><content:encoded><![CDATA[<p>Privileged Identity Management (PIM) is a critical component of Azure Active Directory, enabling organizations to manage, control, and monitor access to important resources. Attackers often target PIM configurations to escalate privileges, establish persistence, or move laterally within a compromised environment. This activity focuses on detecting changes to PIM role settings, which could indicate malicious activity aimed at weakening security controls. Defenders must monitor these changes to prevent unauthorized access and maintain the integrity of their Azure environment. This includes understanding who is making these changes, the scope of the modifications, and whether the changes align with established security policies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> The attacker gains initial access to an account with sufficient privileges to view PIM settings.</li>
<li><strong>Discovery:</strong> The attacker enumerates existing PIM role settings within the Azure Active Directory environment.</li>
<li><strong>Modification:</strong> The attacker modifies existing PIM role settings, such as extending the maximum activation time or removing approval requirements, using the Azure portal, PowerShell, or the Azure CLI.</li>
<li><strong>Privilege Escalation:</strong> By modifying PIM settings, the attacker escalates their privileges, granting themselves elevated access to sensitive resources or administrative functions.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by creating new or modifying existing role assignments to maintain access even if their initial account is compromised.</li>
<li><strong>Lateral Movement:</strong> With escalated privileges, the attacker moves laterally to access other resources or accounts within the Azure environment.</li>
<li><strong>Data Exfiltration/Impact:</strong> The attacker leverages their escalated privileges to exfiltrate sensitive data, disrupt services, or cause other damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of PIM settings can have severe consequences, including unauthorized access to sensitive data, disruption of critical services, and privilege escalation leading to complete compromise of the Azure environment. A single compromised PIM setting can affect multiple users and resources, amplifying the impact of the attack. Early detection of PIM setting modifications can prevent attackers from gaining a foothold and causing significant damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect changes to PIM settings based on the <code>properties.message</code> field within Azure audit logs.</li>
<li>Regularly review Azure audit logs for events related to PIM configuration changes, paying close attention to the user accounts making the changes and the scope of the modifications.</li>
<li>Implement multi-factor authentication (MFA) for all accounts with privileges to manage PIM settings.</li>
<li>Enforce the principle of least privilege by granting users only the minimum permissions required to perform their job functions.</li>
<li>Establish a baseline of normal PIM settings and alert on any deviations from this baseline.</li>
<li>Investigate any alerts triggered by the Sigma rule by correlating them with other security events and user activity.</li>
<li>Implement automated responses to detected PIM setting modifications, such as disabling the affected user account or reverting the changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Unused Privileged Identity Management (PIM) Roles in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-not-used/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-not-used/</guid><description>Detection of assigned but unused privileged roles in Azure's Privileged Identity Management (PIM) service, indicating potential misconfiguration, license overuse, or dormant privileged access that could be exploited.</description><content:encoded><![CDATA[<p>This alert identifies a condition where users have been assigned privileged roles within Azure&rsquo;s Privileged Identity Management (PIM) but are not actively utilizing those roles. This situation can arise from various factors, including misconfiguration of PIM settings, over-allocation of privileged roles due to process gaps or lack of oversight, or the presence of dormant accounts with elevated privileges. Such unused roles represent a potential security risk, as they can be exploited by malicious actors or misused inadvertently, especially if MFA or conditional access policies are not enforced. Regularly auditing and addressing unused PIM roles is crucial for maintaining a strong security posture and optimizing license utilization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An administrator assigns a privileged role to a user within Azure PIM.</li>
<li>The user is granted the role but does not activate or use it to perform any privileged actions.</li>
<li>Azure PIM monitors role usage and detects the lack of activity for the assigned role.</li>
<li>The &ldquo;redundantAssignmentAlertIncident&rdquo; event is triggered within the Azure PIM logs.</li>
<li>An attacker gains access to the user&rsquo;s account through credential compromise or other means.</li>
<li>The attacker activates the unused privileged role.</li>
<li>The attacker leverages the now-active privileged role to perform unauthorized actions, such as modifying system configurations, accessing sensitive data, or escalating privileges further.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise, without being detected due to the pre-existing role assignment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The presence of unused privileged roles can lead to significant security breaches and compliance violations. An attacker exploiting an unused role can gain immediate access to sensitive resources and perform unauthorized actions, potentially leading to data breaches, system outages, or financial losses. The number of affected users and resources depends on the scope of the unused role and the attacker&rsquo;s objectives. Failure to identify and address these unused roles can also result in unnecessary license costs and increased attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>redundantAssignmentAlertIncident</code> events indicating unused PIM roles in Azure (see &ldquo;Roles Are Not Being Used&rdquo; rule).</li>
<li>Investigate all detected instances of unused PIM roles to determine the reason for inactivity and potential risks.</li>
<li>Revoke the assigned role if the user no longer requires it, or provide training and guidance to ensure proper role utilization.</li>
<li>Review and refine PIM role assignment policies to minimize the allocation of unnecessary privileges.</li>
<li>Implement regular audits of PIM role assignments to identify and address unused roles promptly.</li>
<li>Configure security alerts within Azure PIM to receive notifications about unused roles and other potential security incidents.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>privileged-identity-management</category><category>role-based-access-control</category><category>initial-access</category><category>privilege-escalation</category></item><item><title>Privileged Identity Management (PIM) Alerting Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-pim-alerts-disabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-pim-alerts-disabled/</guid><description>An adversary disables Privileged Identity Management (PIM) alerts in Azure to evade detection and maintain persistent access with escalated privileges.</description><content:encoded><![CDATA[<p>Attackers may disable PIM alerts within Azure environments to weaken security monitoring and maintain a low profile while escalating privileges. This involves modifying alert settings within the Azure Privileged Identity Management service to prevent notifications of suspicious or unauthorized activity. This technique enables attackers to operate with reduced scrutiny, making it easier to establish persistence and move laterally within the compromised environment. Successful disabling of PIM alerts allows malicious actors to abuse privileged roles without triggering immediate alarms. This allows for potentially long-term access and control over critical resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to an Azure account, potentially through compromised credentials or exploiting a vulnerability.</li>
<li>Privilege Escalation: The attacker attempts to escalate privileges within the Azure Active Directory, potentially by exploiting misconfigured roles or vulnerabilities.</li>
<li>PIM Access: The attacker accesses the Azure Privileged Identity Management (PIM) service.</li>
<li>Alert Configuration Discovery: The attacker enumerates existing PIM alert configurations to identify the alerts to be disabled.</li>
<li>Alert Modification: The attacker modifies the alert settings, setting them to disabled. This is often done through the Azure portal or via API calls.</li>
<li>Persistence: With alerts disabled, the attacker can maintain persistence by assigning themselves privileged roles without generating notifications.</li>
<li>Lateral Movement: The attacker leverages the newly acquired privileged roles to move laterally within the Azure environment, accessing sensitive resources and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling PIM alerts significantly reduces an organization&rsquo;s visibility into privileged access activities. This can lead to delayed detection of malicious activities, enabling attackers to maintain a persistent presence, escalate privileges, and exfiltrate sensitive data without triggering alarms. The impact includes potential data breaches, financial losses, and reputational damage. The lack of alerts hinders incident response efforts and prolongs the duration of the attack, compounding the damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect instances where PIM alerts are disabled by monitoring <code>auditlogs</code> for <code>properties.message: Disable PIM Alert</code>.</li>
<li>Regularly review PIM alert configurations to ensure critical alerts are enabled and properly configured.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with administrative privileges, to mitigate initial access (T1078).</li>
<li>Enforce the principle of least privilege to limit the scope of potential damage from compromised accounts.</li>
<li>Monitor Azure audit logs for unusual activity related to PIM configuration changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>alerts</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Frequent Azure PIM Role Activation Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-activation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-activation/</guid><description>Detection of frequent role activation in Azure Privileged Identity Management (PIM) by the same user may indicate potential privilege escalation or account compromise.</description><content:encoded><![CDATA[<p>This threat brief addresses suspicious activity within Azure Privileged Identity Management (PIM), specifically the repeated activation of privileged roles by the same user. The alert, triggered by &lsquo;sequentialActivationRenewalsAlertIncident&rsquo; events, suggests that an attacker may be attempting to escalate privileges or maintain persistent access to sensitive resources. This activity can be indicative of compromised credentials or malicious insider activity. The detection is based on Azure PIM logs and aims to identify deviations from normal user behavior related to role activation. Defenders should investigate these alerts promptly to determine the legitimacy of the role activations and mitigate potential risks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to an Azure account, possibly through compromised credentials (T1078).</li>
<li>Privilege Discovery: The attacker identifies available privileged roles within Azure PIM.</li>
<li>Role Activation Request: The attacker initiates a request to activate a privileged role.</li>
<li>Role Activation: The attacker successfully activates the privileged role.</li>
<li>Resource Access: With the activated role, the attacker accesses sensitive resources or performs privileged actions.</li>
<li>Repeated Activation: The attacker deactivates and reactivates the same role shortly after, potentially to bypass monitoring or maintain persistent access.</li>
<li>Lateral Movement (Optional): The attacker uses the elevated privileges to move laterally within the Azure environment.</li>
<li>Data Exfiltration or System Damage (Impact): The attacker achieves their ultimate objective, such as exfiltrating sensitive data or causing damage to systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to unauthorized access to critical resources, data breaches, and significant damage to the organization&rsquo;s Azure environment. The repeated activation of privileged roles can be used to bypass security controls and maintain persistent access, making it difficult to detect malicious activity. A single compromised account with PIM access can lead to widespread impact across the entire Azure infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Roles Activated Too Frequently&rdquo; to your SIEM and tune it based on your environment to reduce false positives (logsource: azure, service: pim).</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Roles Activated Too Frequently&rdquo;, focusing on the context of the role activated and the user involved.</li>
<li>Review the active time period for roles in PIM to ensure they are not set too short, which can lead to frequent legitimate activations and false positives, as noted in the <code>falsepositives</code> section.</li>
<li>Implement multi-factor authentication (MFA) for all users, especially those with privileged roles, to mitigate the risk of credential compromise (T1078).</li>
<li>Monitor Azure Active Directory sign-in logs for suspicious activity, such as logins from unusual locations or devices.</li>
<li>Implement least privilege principles and regularly review role assignments to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>role-activation</category><category>privilege-escalation</category></item><item><title>Azure PIM - Role Assignment Outside of Privileged Identity Management</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-assigned-outside/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-assigned-outside/</guid><description>Detection of privilege role assignments outside of Azure Privileged Identity Management (PIM) can indicate potential attacker activity related to initial access, stealth, persistence, or privilege escalation within the Azure environment.</description><content:encoded><![CDATA[<p>The unauthorized assignment of privileged roles outside of Azure Privileged Identity Management (PIM) represents a significant security risk. Attackers may attempt to bypass PIM controls to gain persistent access, escalate privileges, or move laterally within the Azure environment. Detecting these anomalous role assignments is crucial for identifying potentially compromised accounts or malicious insiders. This activity is a common tactic used by attackers to establish persistence and maintain control over cloud resources. Monitoring for this behavior can help security teams quickly identify and respond to potential breaches, limiting the impact of successful attacks. This activity can be associated with lateral movement, privilege escalation, and persistence within the cloud environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised user account or service principal within the Azure environment.</li>
<li>The attacker attempts to identify existing privileged roles and permissions.</li>
<li>The attacker bypasses PIM to directly assign themselves a privileged role (e.g., Global Administrator, Security Administrator) using Azure CLI, PowerShell, or the Azure portal.</li>
<li>The attacker elevates their permissions without triggering PIM alerts or requiring approval.</li>
<li>The attacker uses the newly assigned privileged role to access sensitive data, modify configurations, or create new resources.</li>
<li>The attacker establishes persistence by creating new accounts or modifying existing ones with elevated privileges.</li>
<li>The attacker moves laterally to other Azure resources or subscriptions using their increased access.</li>
<li>The attacker achieves their final objective, such as data exfiltration, service disruption, or deployment of malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising privileged roles within Azure can have severe consequences, potentially impacting all resources within the affected Azure Active Directory tenant. Successful attacks can lead to unauthorized data access, service disruption, financial loss, and reputational damage. The scope of the impact depends on the level of privilege gained by the attacker and the sensitivity of the targeted resources. Without proper detection and response, organizations may remain unaware of the breach, allowing attackers to maintain persistent access and continue their malicious activities undetected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule <code>Roles Assigned Outside PIM</code> to your SIEM to detect unauthorized role assignments within your Azure environment.</li>
<li>Investigate all instances flagged by the Sigma rule <code>Roles Assigned Outside PIM</code> to determine the legitimacy of the role assignment and the identity of the assigner.</li>
<li>Implement controls to restrict the ability to assign privileged roles outside of PIM, as described in the Microsoft documentation reference.</li>
<li>Review and enforce the principle of least privilege to minimize the potential impact of compromised accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>role-assignment</category><category>attack.initial-access</category><category>attack.stealth</category><category>attack.t1078</category><category>attack.persistence</category><category>attack.privilege-escalation</category></item></channel></rss>