<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Uri — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/uri/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 17:24:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/uri/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detect Application AppID URI Configuration Changes in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-appid-uri-change/</link><pubDate>Wed, 03 Jan 2024 17:24:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-appid-uri-change/</guid><description>Detection of configuration changes to an application's AppID URI in Azure, potentially indicating malicious activity related to initial access, persistence, credential access, privilege escalation, or stealth.</description><content:encoded><![CDATA[<p>Attackers may modify the AppID URI of an application in Azure to facilitate various malicious activities, including gaining unauthorized access, establishing persistence, accessing credentials, escalating privileges, or maintaining stealth within the environment. The AppID URI serves as a unique identifier for an application within the Azure Active Directory (Azure AD) ecosystem. Changes to this URI could indicate that an attacker is attempting to impersonate a legitimate application or service, potentially bypassing security controls and gaining elevated access. Monitoring for these changes is crucial for defenders to identify and respond to potentially malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure account, possibly through compromised credentials or exploiting a vulnerability (T1078.004).</li>
<li>The attacker enumerates available applications and service principals within the Azure environment.</li>
<li>The attacker identifies a target application with a high-value AppID URI.</li>
<li>The attacker modifies the AppID URI of the target application, potentially to impersonate another service or application (T1552).</li>
<li>This change might be done to allow the attacker to request tokens for that application.</li>
<li>The attacker leverages the modified AppID URI to request access tokens, potentially gaining unauthorized access to resources (T1078.004).</li>
<li>The attacker uses the acquired access tokens to move laterally within the Azure environment and access sensitive data or systems.</li>
<li>The attacker maintains persistence by using the modified application for continued unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of an AppID URI can lead to significant security breaches, including unauthorized access to sensitive data, privilege escalation, and persistent compromise of the Azure environment. An attacker can impersonate legitimate applications, bypassing security controls and potentially affecting numerous resources and users. The scope of the impact depends on the permissions and access levels associated with the compromised application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Application AppID Uri Configuration Changes&rdquo; to your SIEM to detect unauthorized modifications to AppID URIs (rule provided below).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the AppID URI changes.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts to reduce the risk of credential compromise.</li>
<li>Regularly review and audit application permissions and configurations to identify and remediate any misconfigurations.</li>
<li>Monitor Azure audit logs for other suspicious activities related to application and service principal management.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>appid</category><category>uri</category><category>application</category><category>serviceprincipal</category><category>credential-access</category><category>privilege-escalation</category></item><item><title>Azure Application URI Configuration Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-app-uri-modification/</link><pubDate>Wed, 03 Jan 2024 14:21:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-app-uri-modification/</guid><description>Detection of Azure application URI modifications that can be indicative of malicious activity, such as using dangling URIs, non-HTTPS URIs, wildcard domains, or URIs pointing to uncontrolled domains, potentially leading to initial access, stealth, persistence, credential access, and privilege escalation.</description><content:encoded><![CDATA[<p>Attackers may modify application URIs within Azure Active Directory to redirect users or applications to malicious resources, obtain unauthorized access, or establish persistence. The modification of an application&rsquo;s URI can be a subtle but effective technique for gaining a foothold in an environment. By manipulating the URI settings, attackers can redirect traffic to attacker-controlled servers, intercept credentials, or perform other malicious actions. This activity is often difficult to detect because it can blend in with legitimate administrative tasks. Investigation is merited if URIs for domain names no longer exist, are not using HTTPS, have wildcards at the end of the domain, are not unique to that app, or point to domains that the organization does not control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an Azure account with sufficient privileges to modify application registrations.</li>
<li>The attacker navigates to the Azure Active Directory portal.</li>
<li>The attacker locates a target application registration.</li>
<li>The attacker modifies the application&rsquo;s URI settings, such as the reply URLs or identifier URIs.</li>
<li>The attacker configures the URI to point to a malicious server or a phishing page.</li>
<li>Users or applications are redirected to the malicious URI when attempting to authenticate or access the application.</li>
<li>The attacker intercepts credentials or performs other malicious actions.</li>
<li>The attacker establishes persistence by maintaining control over the application&rsquo;s URI settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to credential theft, data breaches, or unauthorized access to sensitive resources. By compromising application URIs, attackers can redirect users to phishing pages, intercept credentials, or gain a foothold in the environment for further exploitation. This activity can be difficult to detect and can have a significant impact on the organization&rsquo;s security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Application URI Configuration Changes</code> to your SIEM to detect suspicious modifications to application URIs in Azure Audit Logs.</li>
<li>Investigate any alerts generated by the Sigma rule <code>Application URI Configuration Changes</code> to determine if the URI modification is legitimate or malicious.</li>
<li>Monitor Azure Audit Logs for any changes to application URI settings (as indicated by <code>properties.message: Update Application Sucess- Property Name AppAddress</code>) and validate the legitimacy of the changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>azure</category><category>application</category><category>uri</category><category>modification</category><category>persistence</category><category>credential-access</category><category>privilege-escalation</category></item></channel></rss>