Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Detailed New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

Posted on May 14, 2025May 14, 2025 By CWS

Cybersecurity specialists have unveiled refined methods to determine potential abuse of Azure Managed Identities (MIs), addressing a important however typically missed safety concern in cloud environments.

Azure MIs streamline credential administration by eliminating the necessity for guide secret dealing with, but this comfort creates new assault vectors that refined menace actors can exploit to escalate privileges and entry delicate assets.

The methods, documented in a complete analysis paper by Crew Axon, concentrate on figuring out unauthorized entry and malicious use of MIs slightly than simply detecting their existence.

As these identities are more and more applied throughout Azure companies, they current an increasing assault floor which will enable adversaries to pivot throughout environments, achieve unauthorized entry to Microsoft Graph, and extract delicate information from varied Azure assets.

Hunters researchers famous that whereas MIs supply important safety benefits by eliminating static credentials, their potential misuse could be significantly damaging since they function with the implicit belief of Azure’s authentication framework.

The analysis builds upon earlier work, significantly Karl Fossaen’s DEF CON 32 discuss titled “Identification Theft is Not a Joke, Azure!” which initially raised consciousness round MI abuse vectors.

The threat-hunting method detailed within the paper introduces twelve specialised detection queries, every focusing on totally different elements of potential MI abuse.

These queries vary from high-fidelity detections, equivalent to figuring out specific token requests from digital machines, to broader behavioral analyses that flag when MIs entry uncommon assets or exhibit anomalous authentication patterns.

One of the important methods introduced focuses on detecting Microsoft Graph enumeration actions utilizing compromised MIs.

Detection Methodology

This high-fidelity detection technique identifies when a managed id makes anomalously excessive numbers of requests to Microsoft Graph API endpoints – conduct according to reconnaissance exercise by menace actors who’ve gained unauthorized entry to MI tokens.

The corresponding detection question, applied in Snowflake SQL, creates a typical desk expression that identifies suspicious patterns of Graph API entry:-

WITH graph_enum_activity AS (
SELECT MIN(time) AS min_event_time,
MAX(time) AS max_event_time,
user_principal_object_id,
ARRAY_AGG(DISTINCT request_uri) AS distinct_request_uris,
COUNT(*) AS amount_of_requests
FROM RAW.MICROSOFT_GRAPH_ACTIVITY_LOGS
WHERE request_method = ‘GET’
GROUP BY user_principal_object_id, hour_of_events
HAVING amount_of_requests > 60
AND amount_of_endpoint_base > 5
AND amount_of_request_uris > 30
)

The question establishes behavioral thresholds by analyzing request patterns, flagging instances the place managed identities make suspicious numbers of distinct calls to the Graph API inside a brief timeframe.

This detection method proves significantly efficient as a result of legit MIs sometimes show predictable, restricted request patterns to Graph assets, making anomalous enumeration makes an attempt stand out.

Past detection, the analysis additionally particulars sensible steerage for incident investigation and response, together with cross-correlation methods between Azure Signal-in logs, Exercise logs, and Microsoft Graph telemetry to hint the total scope of potential compromises.

By offering these detection methodologies, safety groups achieve very important capabilities to determine potential compromises earlier than attackers can totally exploit their entry to cloud environments and delicate assets.

How SOC Groups Save Time and Effort with ANY.RUN – Dwell webinar for SOC groups and managers

Cyber Security News Tags:Abuse, Azure, Detailed, Detect, Identity, Managed, Researchers, Techniques, ThreatHunting

Post navigation

Previous Post: Earth Ammit Hackers Attacking Using New Tools to Attack Drones Used in Military Sectors
Next Post: CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users

Related Posts

Critical WordPress Plugin Vulnerability Exposes 10K+ Sites to Cyber Attack Cyber Security News
Windows DWM 0-Day Vulnerability Allows Attackers to Escalate Privileges Cyber Security News
Adobe Photoshop Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers Cyber Security News
\Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News