<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Stealth — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/stealth/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 Nov 2024 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/stealth/feed.xml" rel="self" type="application/rss+xml"/><item><title>GitHub SSH Certificate Configuration Changed</title><link>https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</link><pubDate>Sat, 02 Nov 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</guid><description>Attackers can modify SSH certificate configurations in GitHub organizations to gain unauthorized access, persist in the environment, escalate privileges, and operate stealthily.</description><content:encoded><![CDATA[<p>Attackers can abuse SSH certificate authorities in GitHub to gain unauthorized access to repositories. By creating or disabling SSH certificate requirements, attackers can bypass existing security controls and establish persistent access. This activity is logged in the GitHub audit logs, specifically when <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> actions are performed. Successful exploitation allows attackers to commit malicious code, steal sensitive data, or disrupt development workflows, impacting the integrity and confidentiality of the organization&rsquo;s resources. The GitHub audit log streaming feature must be enabled to detect this activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a GitHub organization, potentially through compromised credentials or social engineering.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates their privileges to an organizational role capable of managing SSH certificate authorities.</li>
<li><strong>SSH Certificate Authority Creation:</strong> The attacker creates a new SSH certificate authority within the GitHub organization (<code>ssh_certificate_authority.create</code>).</li>
<li><strong>Disable SSH Certificate Requirement:</strong> Alternatively, the attacker disables the requirement for members to use SSH certificates to access organization resources (<code>ssh_certificate_requirement.disable</code>). This action allows attackers to bypass security controls that enforce SSH certificate usage.</li>
<li><strong>Unauthorized Access:</strong> The attacker utilizes the newly created SSH certificate authority or the disabled requirement to access repositories without proper authorization.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally within the GitHub organization, accessing additional repositories and resources.</li>
<li><strong>Data Exfiltration/Malicious Code Injection:</strong> The attacker exfiltrates sensitive data or injects malicious code into the organization&rsquo;s repositories.</li>
<li><strong>Persistence:</strong> The attacker maintains persistent access by using the created SSH certificate authority or the disabled requirement for future unauthorized activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of SSH certificate configurations in GitHub can lead to unauthorized code commits, data breaches, and supply chain attacks. This could result in financial losses, reputational damage, and legal repercussions for the affected organization. The number of affected repositories and the severity of the impact depend on the scope of the attacker&rsquo;s access and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the GitHub audit log streaming feature to capture SSH certificate configuration changes (logsource: github, service: audit, definition).</li>
<li>Deploy the provided Sigma rule to detect <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> events in the GitHub audit logs (rule: Github SSH Certificate Configuration Changed).</li>
<li>Regularly review GitHub audit logs for any unauthorized modifications to SSH certificate configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>ssh</category><category>certificate</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category><category>stealth</category><category>t1078.004</category></item><item><title>Kubernetes Event Deletion for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-05-kubernetes-events-deleted/</link><pubDate>Thu, 02 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-kubernetes-events-deleted/</guid><description>An adversary may delete Kubernetes events to evade detection and hide malicious activity within a Kubernetes environment by removing audit logs.</description><content:encoded><![CDATA[<p>Attackers targeting Kubernetes environments may attempt to delete Kubernetes events as a means of covering their tracks. This technique, often employed after successful exploitation or lateral movement, aims to eliminate audit logs and other traces of malicious activity. By removing these logs, attackers can significantly hinder incident response efforts and prolong the duration of their access. While the specifics of initial access will vary, this action will typically be performed using kubectl or similar tools with sufficient privileges within the Kubernetes cluster. Defenders need to monitor for unexpected deletion of event logs to identify potentially compromised systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a container or node within the Kubernetes cluster using an exploit (e.g., exploiting a vulnerability in a containerized application).</li>
<li>Establish persistence by creating a malicious pod or modifying existing deployments to include backdoors.</li>
<li>Escalate privileges within the cluster, potentially by exploiting misconfigured RBAC policies or vulnerable service accounts.</li>
<li>Identify Kubernetes event logs that contain evidence of the attacker&rsquo;s activities, such as pod deployments, privilege escalation attempts, or network connections.</li>
<li>Use <code>kubectl delete events</code> command with appropriate privileges to remove targeted event logs from the Kubernetes audit logs.</li>
<li>Verify that the targeted event logs have been successfully removed from the cluster&rsquo;s audit trail.</li>
<li>Continue lateral movement and data exfiltration, now with reduced risk of detection due to the deleted event logs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of Kubernetes events allows attackers to operate within the cluster undetected for extended periods. This can lead to significant data breaches, system compromise, and disruption of services. The absence of event logs makes forensic investigation and incident response extremely challenging, potentially leading to inaccurate assessments of the scope and impact of the attack. While the exact number of victims is unknown, this technique, if successful, significantly amplifies the damage caused by any initial intrusion.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Kubernetes Events Deleted&rdquo; to your SIEM to detect event deletion attempts in your Kubernetes environment (logsource: application, product: kubernetes, service: audit).</li>
<li>Review and harden RBAC policies to minimize the risk of unauthorized event deletion.</li>
<li>Implement strong audit logging practices and ensure that audit logs are securely stored and protected from tampering.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>stealth</category><category>defense-evasion</category><category>kubernetes</category></item><item><title>Suspicious AWS SAML Activity Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-suspicious-saml/</link><pubDate>Wed, 03 Jan 2024 18:22:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-suspicious-saml/</guid><description>This rule identifies suspicious SAML activity in AWS, such as AssumeRoleWithSAML and UpdateSAMLProvider events, which could indicate an attacker gaining backdoor access, escalating privileges, or establishing persistence.</description><content:encoded><![CDATA[<p>This detection identifies potentially malicious Security Assertion Markup Language (SAML) activity within Amazon Web Services (AWS). The activity includes monitoring for <code>AssumeRoleWithSAML</code> and <code>UpdateSAMLProvider</code> events. An adversary might exploit SAML to gain unauthorized access, escalate privileges, move laterally within the AWS environment, or establish persistent backdoor access. The focus is on detecting unusual or unauthorized modifications to SAML configurations and role assumptions, which could indicate a compromised identity provider or malicious actor leveraging SAML for illicit purposes. Defenders should prioritize monitoring SAML-related API calls to identify and mitigate potential threats early in the attack chain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises or creates a malicious SAML identity provider.</li>
<li>The attacker configures the AWS environment to trust the malicious SAML provider using <code>UpdateSAMLProvider</code>.</li>
<li>The attacker crafts a SAML assertion to assume a specific role within the AWS environment.</li>
<li>The attacker uses the <code>AssumeRoleWithSAML</code> API call to authenticate with AWS using the crafted SAML assertion.</li>
<li>AWS STS validates the SAML assertion and, if valid, provides temporary credentials for the assumed role.</li>
<li>The attacker uses the temporary credentials to perform actions within AWS, potentially escalating privileges.</li>
<li>The attacker moves laterally within the AWS environment, accessing resources and services authorized for the assumed role.</li>
<li>The attacker establishes persistent access by creating backdoors or modifying existing IAM policies, leveraging the initially gained access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via SAML manipulation can lead to a complete compromise of the AWS environment. Attackers can gain unauthorized access to sensitive data, disrupt critical services, and deploy malicious infrastructure. The impact includes potential data breaches, financial losses, and reputational damage. The number of affected resources depends on the permissions associated with the roles assumed by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule for <code>AssumeRoleWithSAML</code> events to detect suspicious role assumptions (see &ldquo;AssumeRoleWithSAML Detection Rule&rdquo;).</li>
<li>Deploy the Sigma rule for <code>UpdateSAMLProvider</code> events to detect unauthorized SAML provider modifications (see &ldquo;UpdateSAMLProvider Detection Rule&rdquo;).</li>
<li>Investigate any <code>AssumeRoleWithSAML</code> events originating from unfamiliar user agents or IP addresses by reviewing CloudTrail logs.</li>
<li>Monitor <code>UpdateSAMLProvider</code> events for unexpected changes to SAML provider configurations. Review associated CloudTrail logs for user identity, user agent, and hostname to ensure authorized access.</li>
<li>Tune the provided Sigma rules for your environment, addressing false positives by exempting known, legitimate behavior.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>saml</category><category>cloudtrail</category><category>initial-access</category><category>lateral-movement</category><category>persistence</category><category>privilege-escalation</category><category>stealth</category></item><item><title>Azure AD User Password Reset Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-user-password-reset/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-user-password-reset/</guid><description>Detects when a user successfully resets their own password in Azure Active Directory, which may indicate malicious activity or account compromise.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting user-initiated password resets within Azure Active Directory (Azure AD). While legitimate password resets are common, monitoring this activity can help identify potentially malicious behavior, such as an attacker attempting to gain unauthorized access to an account or an insider threat actor escalating privileges. Attackers may leverage compromised credentials or social engineering to initiate password resets, bypassing multi-factor authentication (MFA) if it is not properly configured or enforced. This detection is important for defenders because successful password resets can lead to a complete account takeover, allowing attackers to access sensitive data, resources, and systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a user&rsquo;s credentials through phishing, credential stuffing, or malware.</li>
<li>The attacker attempts to log in to an Azure AD-protected resource using the compromised credentials.</li>
<li>The attacker fails to authenticate, either because they do not have the correct password or MFA is enabled.</li>
<li>The attacker initiates a password reset request using the &ldquo;Forgot password&rdquo; feature or a similar mechanism.</li>
<li>Azure AD sends a password reset verification code or link to the user&rsquo;s registered email address or phone number.</li>
<li>If the attacker controls the registered email address or phone number (due to prior compromise), they can access the verification code or link.</li>
<li>The attacker uses the verification code or link to set a new password for the user&rsquo;s Azure AD account.</li>
<li>The attacker logs in to the Azure AD account with the new password, gaining unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful password resets by attackers can lead to complete account takeover, allowing them to access sensitive data, resources, and systems protected by Azure AD. This can result in data breaches, financial loss, reputational damage, and disruption of business operations. The impact depends on the privileges and permissions assigned to the compromised account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Password Reset By User Account</code> to your SIEM to detect user-initiated password resets in Azure AD audit logs.</li>
<li>Investigate any detected password resets, especially those initiated by users who have not recently requested a password change.</li>
<li>Review and enforce multi-factor authentication (MFA) policies to prevent attackers from bypassing password-based authentication.</li>
<li>Monitor Azure AD audit logs for suspicious activity related to password resets, such as multiple failed login attempts followed by a successful reset.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>password-reset</category><category>privilege-escalation</category><category>initial-access</category><category>persistence</category><category>credential-access</category><category>stealth</category></item><item><title>Azure Service Principal Removal Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-service-principal-removed/</link><pubDate>Wed, 03 Jan 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-service-principal-removed/</guid><description>Detection of a service principal removal in Azure, potentially indicating malicious activity or an attempt to remove evidence of a compromise.</description><content:encoded><![CDATA[<p>The removal of a service principal within an Azure environment can be indicative of various activities, ranging from legitimate administrative tasks to malicious actions undertaken by threat actors attempting to cover their tracks. While service principals are routinely removed as part of lifecycle management, unauthorized or unexpected removals should be investigated promptly. This detection focuses on identifying such removals through Azure Activity Logs, allowing security teams to quickly respond to potentially suspicious events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains unauthorized access to an Azure account through compromised credentials or other means.</li>
<li>The attacker identifies a service principal used for malicious purposes or to maintain persistence.</li>
<li>The attacker attempts to remove the service principal to evade detection or disrupt incident response efforts.</li>
<li>The attacker executes the necessary commands or uses the Azure portal to initiate the service principal removal. This action is logged in the Azure Activity Logs.</li>
<li>The Azure Activity Logs record an event with the message &ldquo;Remove service principal&rdquo;.</li>
<li>The detection rule triggers based on the &ldquo;Remove service principal&rdquo; message in the Azure Activity Logs.</li>
<li>Security analysts investigate the event, examining the user identity, user agent, and hostname associated with the removal.</li>
<li>If the removal is deemed unauthorized or suspicious, further incident response procedures are initiated.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful removal of a service principal by a malicious actor can disrupt legitimate applications relying on that principal for authentication and authorization. It can also hinder incident response efforts by eliminating a potential avenue for investigation or remediation. The impact can range from service disruptions to prolonged breaches if the attacker successfully covers their tracks. The number of affected applications and the severity of the disruption depend on the role and permissions associated with the removed service principal.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Azure Service Principal Removed&rdquo; to your SIEM and tune for your environment, focusing on identifying legitimate administrator activity to reduce false positives.</li>
<li>Investigate any detected instance of service principal removal, focusing on the user identity, user agent, and hostname from the Azure Activity Logs to determine legitimacy.</li>
<li>Review Azure AD audit logs for related activities occurring before and after the service principal removal.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>service principal</category><category>stealth</category><category>cloud</category></item><item><title>Unauthorized Guest User Invitation Attempt in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-guest-invite-failure/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-guest-invite-failure/</guid><description>Detection of a failed attempt to invite an external guest user by an Azure user lacking the necessary permissions, potentially indicating privilege escalation or malicious insider activity.</description><content:encoded><![CDATA[<p>This alert detects instances where a user attempts to invite an external guest user to an Azure environment but fails due to insufficient permissions. This activity can signify several potential security risks, including unauthorized privilege escalation attempts by internal users or malicious insiders attempting to expand access without proper authorization. While legitimate failed attempts may occur, repeated or targeted failures should be investigated. The activity is logged within the Azure Audit Logs. Detecting this activity is crucial for maintaining control over user access and preventing potential data breaches. The relevant log data resides within Azure&rsquo;s audit logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An internal user (either compromised or malicious) attempts to invite an external guest user via the Azure portal or API.</li>
<li>The Azure Active Directory service checks the inviter&rsquo;s permissions against the organization&rsquo;s guest invitation policies.</li>
<li>The system determines the user lacks the necessary permissions to invite guest users.</li>
<li>Azure Audit Logs record the &ldquo;Invite external user&rdquo; event with a &ldquo;failure&rdquo; status.</li>
<li>The failed invitation attempt is blocked, preventing the external user from gaining access.</li>
<li>The attacker may retry the invitation with different accounts or methods, attempting to bypass access controls.</li>
<li>If successful through other means (not detected by this rule), the guest user could be used for lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation could grant unauthorized access to sensitive data and resources within the Azure environment. While this specific detection focuses on failed attempts, repeated failures may indicate a concerted effort to bypass security controls. If successful, unauthorized guest users could be used for lateral movement, data exfiltration, or other malicious activities. The number of affected resources depends on the permissions granted to the guest user if the invitation had been successful.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Guest User Invited By Non Approved Inviters&rdquo; to your SIEM to detect unauthorized invitation attempts within Azure Audit Logs.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the invitation attempt and the intent of the user.</li>
<li>Review and enforce the principle of least privilege for user roles and permissions within Azure Active Directory.</li>
<li>Monitor for repeated failed invitation attempts from the same user account (correlate with the Azure Audit Logs data).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>initial-access</category><category>persistence</category><category>stealth</category><category>azure</category></item><item><title>Azure Subscription Permission Elevation via Activity Logs</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-subscription-elevation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-subscription-elevation/</guid><description>An attacker elevates their Azure subscription permissions to manage all subscriptions, potentially leading to unauthorized access and control over the environment.</description><content:encoded><![CDATA[<p>This threat involves the elevation of user permissions within an Azure environment to manage all Azure subscriptions. While legitimate administrators may perform this action, unauthorized elevation of permissions can grant an attacker significant control over the entire Azure environment. This could be an insider threat or a compromised account being used to broaden access. The activity is logged within Azure Activity Logs, providing an opportunity for detection. Defenders should be aware of this potential escalation path and monitor for unexpected or unauthorized permission changes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an Azure account, potentially through compromised credentials (T1078.004).</li>
<li>The attacker authenticates to the Azure portal or uses Azure CLI/PowerShell with the compromised account.</li>
<li>The attacker attempts to elevate their permissions using the <code>MICROSOFT.AUTHORIZATION/ELEVATEACCESS/ACTION</code> operation.</li>
<li>Azure Activity Logs record the attempt to elevate permissions.</li>
<li>If successful, the attacker gains management access to all Azure subscriptions within the tenant.</li>
<li>The attacker can then provision resources, modify configurations, and access data within those subscriptions.</li>
<li>The attacker might establish persistence by creating new user accounts with elevated privileges or modifying existing roles.</li>
<li>The attacker can then exfiltrate sensitive data or disrupt services within the Azure environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful elevation of permissions to manage all Azure subscriptions allows an attacker to control all resources, data, and configurations within the Azure environment. This can lead to data breaches, service disruptions, financial loss, and reputational damage. The scope of impact depends on the sensitivity of the data stored within Azure and the criticality of the services hosted there.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized <code>MICROSOFT.AUTHORIZATION/ELEVATEACCESS/ACTION</code> operations in Azure Activity Logs.</li>
<li>Investigate any detected instances of <code>MICROSOFT.AUTHORIZATION/ELEVATEACCESS/ACTION</code> immediately, as outlined in the rule description.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts to reduce the risk of credential compromise.</li>
<li>Review and enforce the principle of least privilege for Azure role assignments.</li>
<li>Monitor Azure Activity Logs for other suspicious activities, such as unusual resource creation or modification.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>privilege-escalation</category><category>persistence</category><category>initial-access</category><category>stealth</category></item><item><title>Azure AD Account Created and Deleted Within a Close Time Frame</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-short-lived-account/</link><pubDate>Tue, 02 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-short-lived-account/</guid><description>Detection of Azure Active Directory accounts that are created and deleted within a short timeframe, potentially indicating malicious activity such as privilege escalation or persistence attempts.</description><content:encoded><![CDATA[<p>The creation and immediate deletion of user accounts within Azure Active Directory can be indicative of various malicious activities. Attackers may create accounts to escalate privileges, establish persistence, or gain initial access to a system. The short lifespan of these accounts suggests an attempt to evade detection. This behavior is particularly concerning as it can be used to perform actions and then quickly remove the evidence of the account&rsquo;s existence from standard audit logs. Monitoring for this activity helps defenders identify and respond to potential security breaches within their Azure environment. This technique is relevant for any organization utilizing Azure Active Directory for user management.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure AD environment, potentially through compromised credentials or a phishing attack.</li>
<li>The attacker creates a new user account within the Azure AD. This can be achieved through the Azure portal, PowerShell, or the Azure CLI.</li>
<li>The attacker assigns elevated privileges to the newly created account. This might involve adding the account to privileged roles such as Global Administrator or assigning specific permissions to access sensitive resources.</li>
<li>The attacker uses the newly created account to perform malicious activities, such as accessing confidential data, modifying system configurations, or deploying malicious applications.</li>
<li>After completing the malicious tasks, the attacker removes the elevated privileges from the account to reduce the chances of detection during privilege reviews.</li>
<li>The attacker deletes the created account from Azure AD. This step is performed to remove the traces of the account&rsquo;s existence and hinder forensic investigations.</li>
<li>The actions performed by the short-lived account may leave other traces in logs, such as access logs or activity logs related to the resources the account interacted with.</li>
<li>The attacker aims to maintain stealth and evade detection while gaining unauthorized access to resources or establishing persistence within the Azure AD environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive resources, data breaches, and system compromise. The creation and deletion of short-lived accounts can mask malicious activities, making it difficult to trace the attacker&rsquo;s actions. Organizations using Azure AD could experience data exfiltration, financial loss, and reputational damage. Detecting such activity early is critical to preventing further damage and mitigating the impact of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Account Created And Deleted Within A Close Time Frame&rdquo; to your SIEM and tune for your environment to detect suspicious account creation/deletion events in Azure AD audit logs.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Account Created And Deleted Within A Close Time Frame&rdquo; to determine the scope and impact of the potential compromise.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with elevated privileges, to reduce the risk of credential compromise (reference: attack.initial-access).</li>
<li>Regularly review Azure AD audit logs for unusual account activity, focusing on accounts created and deleted within a short timeframe (logsource: azure, service: auditlogs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>persistence</category><category>initial-access</category><category>stealth</category><category>account-manipulation</category></item><item><title>AWS Root Account Usage Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-aws-root-usage/</link><pubDate>Tue, 02 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-aws-root-usage/</guid><description>The AWS root account, which grants unrestricted access to all resources within an AWS account, was used, potentially indicating unauthorized activity, privilege escalation, or a breach of security best practices.</description><content:encoded><![CDATA[<p>The use of the AWS root account should be strictly limited to specific tasks that cannot be performed with IAM users or roles. This alert indicates that the root account was used, which could signify various security concerns. An attacker with access to the root account can perform any action within the AWS environment, including creating new users, modifying security policies, accessing sensitive data, and deleting resources. Defenders should investigate each instance of root account usage to determine legitimacy. This activity may also indicate a misconfiguration where IAM roles should be used.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to the AWS root account credentials through credential theft or other means.</li>
<li>The attacker authenticates to the AWS Management Console or uses the AWS CLI with the root account credentials.</li>
<li>The attacker enumerates AWS resources to identify potential targets for privilege escalation.</li>
<li>The attacker creates or modifies IAM policies to grant themselves additional permissions.</li>
<li>The attacker may create new IAM users or roles with elevated privileges.</li>
<li>The attacker uses the elevated privileges to access sensitive data stored in S3 buckets or other AWS services.</li>
<li>The attacker modifies security configurations, such as network access control lists or security groups, to facilitate lateral movement or data exfiltration.</li>
<li>The attacker could disable logging features to cover tracks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise of the AWS root account can lead to a complete breach of the AWS environment, resulting in unauthorized access to sensitive data, data loss, service disruption, and potential financial losses. Attackers can leverage root privileges to perform nearly any action within the AWS account, affecting all services and resources. The number of affected victims depends on the scope and criticality of the AWS environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS Root Credentials&rdquo; to your SIEM to detect root account usage based on CloudTrail logs.</li>
<li>Investigate all instances of root account usage identified by the &ldquo;AWS Root Credentials&rdquo; Sigma rule to determine legitimacy.</li>
<li>Enforce multi-factor authentication (MFA) on all AWS accounts, including the root account, as documented in <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html">AWS documentation</a>.</li>
<li>Implement the principle of least privilege by granting IAM users and roles only the permissions they need to perform their tasks.</li>
<li>Regularly audit IAM policies and user permissions to identify and remove unnecessary privileges.</li>
<li>Disable or restrict root account access wherever possible, delegating tasks to IAM users/roles.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>privilege-escalation</category><category>initial-access</category><category>persistence</category><category>stealth</category></item></channel></rss>