<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Policy — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/policy/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 29 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/policy/feed.xml" rel="self" type="application/rss+xml"/><item><title>Okta Policy Rule Modification or Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-okta-policy-rule-modification/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-okta-policy-rule-modification/</guid><description>An Okta policy rule was modified or deleted, potentially weakening security controls.</description><content:encoded><![CDATA[<p>Okta is a widely used identity and access management platform. Threat actors may target Okta configurations to weaken an organization&rsquo;s security posture. This activity involves modifications or deletions of policy rules within Okta. Such changes can reduce the effectiveness of multi-factor authentication (MFA) requirements, bypass access controls, or disable security logging. Detection of these changes is crucial to maintaining a strong security baseline and preventing unauthorized access to sensitive resources. Defenders should monitor Okta logs for unexpected or unauthorized policy rule modifications or deletions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains unauthorized access to an Okta administrator account, possibly through credential theft or phishing.</li>
<li>Authentication: The attacker authenticates to the Okta admin dashboard using the compromised credentials.</li>
<li>Discovery: The attacker enumerates existing policy rules to understand the current security configuration.</li>
<li>Modification: The attacker modifies an existing policy rule to weaken its security controls. This could involve disabling MFA, bypassing location restrictions, or altering group membership requirements.</li>
<li>Deletion: Alternatively, the attacker deletes a policy rule entirely, effectively removing a layer of security.</li>
<li>Privilege Escalation: With weakened or removed policy rules, the attacker escalates privileges, gaining access to sensitive applications or data.</li>
<li>Lateral Movement: The attacker leverages the compromised Okta environment to move laterally within the organization&rsquo;s network, accessing additional systems and resources.</li>
<li>Impact: The attacker achieves their final objective, such as data exfiltration, financial fraud, or system disruption, due to the weakened security posture.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or deletion of Okta policy rules can severely compromise an organization&rsquo;s security. Consequences include unauthorized access to sensitive data, privilege escalation, lateral movement, and ultimately, data breaches or financial loss. The number of affected users and systems depends on the scope of the compromised policy rules and the attacker&rsquo;s subsequent actions. Organizations in all sectors that rely on Okta for identity management are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Okta Policy Rule Modified or Deleted&rdquo; Sigma rule to your SIEM to detect unauthorized changes (rule reference).</li>
<li>Review Okta system logs regularly for policy rule modifications or deletions, focusing on unusual source IPs or user agents.</li>
<li>Implement multi-factor authentication (MFA) for all Okta administrator accounts to prevent unauthorized access (reference: Okta documentation).</li>
<li>Enforce the principle of least privilege for Okta administrator roles, limiting the number of users who can modify policy rules.</li>
<li>Alert on eventType <code>policy.rule.update</code> or <code>policy.rule.delete</code> in Okta logs using the provided Sigma rule (rule reference).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>okta</category><category>identity</category><category>policy</category><category>attack.impact</category></item><item><title>S3Browser IAM Policy Creation with Default Bucket Name</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-s3browser-iam-policy/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-s3browser-iam-policy/</guid><description>An AWS IAM policy is created by the S3Browser utility with the default S3 bucket name placeholder, potentially indicating unauthorized access or misconfiguration.</description><content:encoded><![CDATA[<p>The S3Browser utility is being used to create Inline IAM policies within AWS. This activity is flagged as suspicious when the policy includes the default S3 bucket name placeholder value of <code>&lt;YOUR-BUCKET-NAME&gt;</code>. This could indicate that the user has not properly configured the policy or is unaware of the implications of using a generic placeholder, potentially granting unintended access to S3 resources. This behavior was observed being used by the threat actor Guivil. The use of S3Browser in this manner poses a risk of privilege escalation, persistence, and unauthorized access to sensitive data stored in S3 buckets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, possibly through compromised credentials or misconfigured IAM roles (T1078.004).</li>
<li>The attacker utilizes the S3Browser utility to interact with AWS S3 buckets.</li>
<li>The attacker attempts to create an Inline IAM policy using S3Browser.</li>
<li>The attacker fails to replace the default bucket name placeholder <code>&lt;YOUR-BUCKET-NAME&gt;</code> with a specific bucket ARN.</li>
<li>The attacker saves the IAM policy with the default bucket name placeholder, leading to a broad or unintended scope of permissions.</li>
<li>The poorly configured policy is applied to a user, role, or group.</li>
<li>The attacker potentially escalates privileges or gains unauthorized access to S3 resources.</li>
<li>The attacker persists in the environment with the newly created or modified IAM policy.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Creation of an IAM policy with the default bucket name placeholder leaves S3 buckets open to potential unauthorized access. A successful attack could lead to data exfiltration, data modification, or denial of service. The scope of the impact depends on the specific permissions granted within the policy and the resources accessible through the affected IAM user, role, or group.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS IAM S3Browser Templated S3 Bucket Policy Creation&rdquo; to your SIEM and tune for your environment to detect this specific activity.</li>
<li>Investigate any instances where <code>PutUserPolicy</code> events are associated with the S3Browser user agent (logsource: aws/cloudtrail).</li>
<li>Review existing IAM policies for the presence of the default bucket name placeholder <code>arn:aws:s3:::&lt;YOUR-BUCKET-NAME&gt;/*</code> (logsource: aws/cloudtrail).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>iam</category><category>s3browser</category><category>s3</category><category>policy</category><category>cloudtrail</category></item><item><title>Okta Policy Modification or Deletion Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-policy-change/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-policy-change/</guid><description>An Okta policy was modified or deleted, potentially indicating unauthorized changes to security configurations within the Okta identity management platform by a malicious actor or insider.</description><content:encoded><![CDATA[<p>This alert identifies modifications or deletions of Okta policies, which govern authentication, authorization, and access control within the Okta Identity Cloud platform. While legitimate administrators routinely update policies, unauthorized changes can weaken security postures and grant malicious actors elevated privileges or bypass security controls. The source event indicates a potential compromise or insider threat activity within the Okta environment. Because Okta serves as a critical identity provider for many organizations, any unauthorized change to its policies can have far-reaching consequences. Detecting policy changes is crucial for maintaining the integrity and security of the Okta environment and preventing potential breaches. The targeted scope includes all Okta-managed applications and resources protected by the modified or deleted policy.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains access to an Okta administrator account, either through compromised credentials (e.g., phishing, credential stuffing) or insider access.</li>
<li><strong>Authentication:</strong> The attacker authenticates to the Okta admin console using the compromised or legitimate administrator account.</li>
<li><strong>Policy Enumeration:</strong> The attacker identifies target Okta policies to modify or delete using the Okta admin console or API.</li>
<li><strong>Policy Modification/Deletion:</strong> The attacker modifies or deletes the targeted Okta policy through the Okta admin console or API. This generates an <code>policy.lifecycle.update</code> or <code>policy.lifecycle.delete</code> event.</li>
<li><strong>Privilege Escalation (Potential):</strong> By modifying policies, the attacker may escalate privileges, granting themselves or other unauthorized users access to sensitive applications and resources.</li>
<li><strong>Lateral Movement (Potential):</strong> With escalated privileges, the attacker moves laterally within the Okta environment, accessing other applications and resources.</li>
<li><strong>Data Exfiltration/Damage (Potential):</strong> The attacker leverages the compromised Okta environment to exfiltrate sensitive data or cause damage to connected systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Okta policy modification or deletion can have significant consequences. Unauthorized policy changes can weaken security controls, allowing attackers to bypass authentication mechanisms, escalate privileges, and gain unauthorized access to sensitive applications and data. This could lead to data breaches, financial loss, and reputational damage. The impact depends on the scope of the affected policy and the applications it protects. The number of victims could range from a few individuals to the entire organization, depending on the scope of the compromised policy.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect Okta policy modifications or deletions (<code>policy.lifecycle.update</code>, <code>policy.lifecycle.delete</code> event types).</li>
<li>Investigate any detected policy changes to verify their legitimacy and identify the user responsible.</li>
<li>Review Okta administrator account activity for any signs of compromise or unauthorized access.</li>
<li>Implement multi-factor authentication (MFA) for all Okta administrator accounts to prevent unauthorized access.</li>
<li>Regularly review and audit Okta policies to ensure they are configured securely and in accordance with security best practices.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>identity</category><category>okta</category><category>policy</category><category>attack.impact</category></item></channel></rss>