<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Suspicious-Browser — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/suspicious-browser/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 31 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/suspicious-browser/feed.xml" rel="self" type="application/rss+xml"/><item><title>Azure Identity Protection Suspicious Browser Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-31-suspicious-azure-browser/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-31-suspicious-azure-browser/</guid><description>A suspicious browser activity alert indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser, potentially indicating compromised credentials or other malicious activity.</description><content:encoded><![CDATA[<p>The &ldquo;suspiciousBrowser&rdquo; risk event in Azure Identity Protection signals unusual sign-in patterns indicative of potential account compromise or other malicious activity. This alert is triggered when the same browser is used to access multiple tenants from different countries, which is an atypical behavior for legitimate users. This type of activity could be caused by malware, credential theft, or an attacker attempting to blend in with normal user behavior after gaining unauthorized access. This detection is important for defenders because it can highlight early stages of an attack, potentially preventing lateral movement, data exfiltration, or other damaging actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a user&rsquo;s credentials through phishing, malware, or other means (T1566, T1190).</li>
<li>The attacker configures a browser with the stolen credentials.</li>
<li>The attacker uses the same browser to attempt sign-ins to multiple Azure tenants from different geographical locations, attempting to blend in with typical user activity.</li>
<li>Azure Identity Protection detects the &ldquo;suspiciousBrowser&rdquo; risk event based on the anomalous sign-in activity.</li>
<li>If successful, the attacker may gain access to sensitive data and resources within the targeted tenants.</li>
<li>The attacker leverages the compromised accounts to escalate privileges and move laterally within the organization (T1078, T1068).</li>
<li>The attacker exfiltrates sensitive data or deploy ransomware (T1003, T1486).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack exploiting suspicious browser activity can lead to unauthorized access to multiple Azure tenants, potentially impacting numerous organizations. The compromise of user accounts can result in data breaches, financial losses, and reputational damage. The scope of the impact depends on the level of access granted to the compromised accounts and the sensitivity of the data stored within the targeted tenants.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect &ldquo;suspiciousBrowser&rdquo; risk events in your Azure environment and tune for your environment.</li>
<li>Investigate sessions flagged by this detection in the context of other sign-ins from the same user to identify false positives.</li>
<li>Enforce multi-factor authentication (MFA) to mitigate the impact of compromised credentials.</li>
<li>Monitor user sign-in activity for unusual patterns, such as sign-ins from multiple geographical locations within a short period.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>identity-protection</category><category>suspicious-browser</category></item></channel></rss>