<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Role-Assignment — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/role-assignment/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:27:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/role-assignment/feed.xml" rel="self" type="application/rss+xml"/><item><title>Azure AD User Added to Global or Device Admin Role</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azuread-role-assignment/</link><pubDate>Wed, 03 Jan 2024 18:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azuread-role-assignment/</guid><description>An attacker may attempt to add a user to a high-privilege Azure AD role, such as Global Administrator or Device Administrator, to establish persistence, gain initial access, escalate privileges, or operate stealthily within the compromised environment.</description><content:encoded><![CDATA[<p>Attackers often target identity and access management systems like Azure Active Directory (Azure AD) to gain control over an organization&rsquo;s resources. By adding users to highly privileged roles such as Global Administrator or Device Administrator, adversaries can achieve persistence, allowing them to regain access even after initial compromises are remediated. This activity often occurs after an initial foothold has been established, enabling privilege escalation and stealthy movement within the cloud environment. Monitoring role assignments in Azure AD is crucial for detecting and preventing unauthorized access and maintaining the integrity of the organization&rsquo;s cloud infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure AD account, possibly through credential theft or phishing.</li>
<li>The attacker authenticates to the Azure portal or uses PowerShell with compromised credentials.</li>
<li>The attacker enumerates existing Azure AD roles and identifies potential targets like Global Administrator or Device Administrator.</li>
<li>The attacker uses the <code>Add-AzureADGroupMember</code> or similar cmdlets to add a compromised or newly created user account to the target role.</li>
<li>The Azure AD audit logs record the &ldquo;Add member to role&rdquo; operation with the specific role GUIDs (e.g., &lsquo;7698a772-787b-4ac8-901f-60d6b08affd2&rsquo; or &lsquo;62e90394-69f5-4237-9190-012177145e10&rsquo;).</li>
<li>The newly added user account inherits the privileges associated with the Global Administrator or Device Administrator role.</li>
<li>The attacker leverages the elevated privileges to access sensitive data, modify configurations, or deploy malicious applications.</li>
<li>The attacker establishes persistent access by creating new administrative accounts or modifying existing ones to maintain control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful addition of a user to a Global Administrator or Device Administrator role grants the attacker unrestricted access to the Azure AD tenant, potentially impacting all resources connected to it. This can lead to data breaches, service disruptions, financial losses, and reputational damage. The scope of the impact depends on the extent to which the attacker leverages the compromised privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious additions of users to Global or Device Admin roles in Azure AD Audit Logs.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the context of the user account being added and the source of the role assignment operation.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with administrative privileges, to mitigate the risk of credential theft (T1078.004).</li>
<li>Regularly review Azure AD role assignments to identify and remove any unauthorized or unnecessary privileges.</li>
<li>Monitor for other suspicious Azure AD activity, such as unusual sign-in patterns, application registrations, and resource deployments.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azuread</category><category>role-assignment</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Azure AD Privileged Role Assignment</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-role-assignment/</link><pubDate>Tue, 02 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-role-assignment/</guid><description>Detection of a user being added to a privileged role in Azure AD, potentially indicating privilege escalation or persistence by an attacker.</description><content:encoded><![CDATA[<p>This alert focuses on the addition of users to privileged roles within Azure Active Directory (Azure AD). An attacker who gains initial access to an account may attempt to escalate privileges to gain broader control over the Azure environment. This can be achieved by adding the compromised account or a new attacker-controlled account to a highly privileged role. This activity often occurs after an initial compromise and is a critical step in establishing persistence and expanding access within the target environment. Successful role assignment allows the attacker to perform actions normally restricted to administrators, potentially leading to data exfiltration, service disruption, or further lateral movement. This activity is visible in the Azure Audit Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure AD account through credential phishing or password spraying (T1078.004).</li>
<li>The attacker identifies potential target roles with high privileges within the Azure AD environment.</li>
<li>The attacker attempts to add the compromised account, or a new account under their control, to one of these privileged roles.</li>
<li>The attacker executes an &ldquo;Add eligible member&rdquo; action, either permanent or eligible, within Azure AD, which is logged in the audit logs.</li>
<li>Azure AD processes the request and, if successful, grants the new role assignment to the target account.</li>
<li>The attacker uses the newly acquired privileges to access sensitive resources, modify configurations, or deploy malicious applications.</li>
<li>The attacker establishes persistence by creating new administrative accounts or modifying existing configurations to maintain access even if the initial compromised account is remediated.</li>
<li>The attacker performs data exfiltration or causes disruption to the Azure environment based on their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful addition of a user to a privileged role can grant the attacker complete control over the Azure AD environment. This may allow them to access sensitive data, disrupt critical services, and deploy malicious applications. The impact can range from data breaches and financial loss to complete compromise of the organization&rsquo;s cloud infrastructure. The scope depends on the role assigned, but global administrator roles can cause catastrophic damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;User Added To Privilege Role&rdquo; to your SIEM to detect suspicious role assignments in Azure AD Audit Logs.</li>
<li>Review Azure AD audit logs for any &ldquo;Add eligible member&rdquo; events (permanent or eligible) to identify potentially malicious role assignments.</li>
<li>Implement multi-factor authentication (MFA) for all users, especially those with administrative privileges, to mitigate the risk of initial access compromise (T1110).</li>
<li>Enforce the principle of least privilege to limit the scope of access for each user and role (T1068).</li>
<li>Regularly audit and review user role assignments to identify and remove unnecessary privileges.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>privileged-access</category><category>role-assignment</category></item><item><title>Azure PIM - Role Assignment Outside of Privileged Identity Management</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-assigned-outside/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-assigned-outside/</guid><description>Detection of privilege role assignments outside of Azure Privileged Identity Management (PIM) can indicate potential attacker activity related to initial access, stealth, persistence, or privilege escalation within the Azure environment.</description><content:encoded><![CDATA[<p>The unauthorized assignment of privileged roles outside of Azure Privileged Identity Management (PIM) represents a significant security risk. Attackers may attempt to bypass PIM controls to gain persistent access, escalate privileges, or move laterally within the Azure environment. Detecting these anomalous role assignments is crucial for identifying potentially compromised accounts or malicious insiders. This activity is a common tactic used by attackers to establish persistence and maintain control over cloud resources. Monitoring for this behavior can help security teams quickly identify and respond to potential breaches, limiting the impact of successful attacks. This activity can be associated with lateral movement, privilege escalation, and persistence within the cloud environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised user account or service principal within the Azure environment.</li>
<li>The attacker attempts to identify existing privileged roles and permissions.</li>
<li>The attacker bypasses PIM to directly assign themselves a privileged role (e.g., Global Administrator, Security Administrator) using Azure CLI, PowerShell, or the Azure portal.</li>
<li>The attacker elevates their permissions without triggering PIM alerts or requiring approval.</li>
<li>The attacker uses the newly assigned privileged role to access sensitive data, modify configurations, or create new resources.</li>
<li>The attacker establishes persistence by creating new accounts or modifying existing ones with elevated privileges.</li>
<li>The attacker moves laterally to other Azure resources or subscriptions using their increased access.</li>
<li>The attacker achieves their final objective, such as data exfiltration, service disruption, or deployment of malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising privileged roles within Azure can have severe consequences, potentially impacting all resources within the affected Azure Active Directory tenant. Successful attacks can lead to unauthorized data access, service disruption, financial loss, and reputational damage. The scope of the impact depends on the level of privilege gained by the attacker and the sensitivity of the targeted resources. Without proper detection and response, organizations may remain unaware of the breach, allowing attackers to maintain persistent access and continue their malicious activities undetected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule <code>Roles Assigned Outside PIM</code> to your SIEM to detect unauthorized role assignments within your Azure environment.</li>
<li>Investigate all instances flagged by the Sigma rule <code>Roles Assigned Outside PIM</code> to determine the legitimacy of the role assignment and the identity of the assigner.</li>
<li>Implement controls to restrict the ability to assign privileged roles outside of PIM, as described in the Microsoft documentation reference.</li>
<li>Review and enforce the principle of least privilege to minimize the potential impact of compromised accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>role-assignment</category><category>attack.initial-access</category><category>attack.stealth</category><category>attack.t1078</category><category>attack.persistence</category><category>attack.privilege-escalation</category></item></channel></rss>