<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Risk-Based Consent — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/risk-based-consent/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/risk-based-consent/feed.xml" rel="self" type="application/rss+xml"/><item><title>Microsoft 365 Risk-Based Step-Up Consent Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-o365-risky-app-consent-disabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-o365-risky-app-consent-disabled/</guid><description>The Microsoft 365 'risk-based step-up consent' security setting is disabled by an adversary to allow users to grant consent to malicious applications, potentially leading to unauthorized access and data breaches.</description><content:encoded><![CDATA[<p>The disabling of the &ldquo;risk-based step-up consent&rdquo; feature in Microsoft 365 is a significant security concern. This feature, when enabled, adds an extra layer of security by requiring administrator approval or additional authentication steps when users attempt to grant permissions to applications deemed risky by Microsoft. When disabled, users can grant consent to potentially malicious OAuth applications without any additional checks, increasing the risk of OAuth phishing attacks. An attacker might disable this feature to facilitate easier access to sensitive user data through malicious applications, bypassing security controls implemented to protect the organization. This could be part of a broader attack to compromise user accounts and exfiltrate data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an account with sufficient privileges to modify Azure Active Directory authorization policies.</li>
<li>The attacker navigates to the Azure Active Directory settings.</li>
<li>The attacker identifies the &ldquo;risk-based step-up consent&rdquo; setting.</li>
<li>The attacker disables the &ldquo;AllowUserConsentForRiskyApps&rdquo; setting by modifying the authorization policy.</li>
<li>Users are now able to grant consent to risky OAuth applications without triggering additional security checks.</li>
<li>The attacker deploys or promotes a malicious OAuth application, tricking users into granting it permissions.</li>
<li>The malicious application gains access to user data and other resources based on the granted permissions.</li>
<li>The attacker exfiltrates sensitive data or performs other malicious actions using the compromised application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling the risk-based step-up consent feature can significantly increase the attack surface of a Microsoft 365 environment. If successful, attackers can compromise user accounts and exfiltrate sensitive data. This can lead to financial loss, reputational damage, and legal liabilities. Organizations that fail to monitor and protect this setting are at higher risk of OAuth phishing attacks and subsequent data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the &ldquo;risk-based step-up consent&rdquo; security setting in Microsoft 365 to prevent users from granting consent to risky applications without proper authorization.</li>
<li>Deploy the Sigma rule <code>O365 Block User Consent For Risky Apps Disabled</code> to your SIEM to detect when this setting is modified.</li>
<li>Review Azure Active Directory audit logs for unexpected changes to authorization policies related to application consent.</li>
<li>Monitor user activity for OAuth application consent grants, especially to applications from untrusted or unknown publishers.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azuread</category><category>o365</category><category>oauth</category><category>risk-based consent</category><category>defense-evasion</category></item></channel></rss>