Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Researchers Detailed New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

Researchers Detailed New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

Posted on May 14, 2025May 14, 2025 By CWS

Cybersecurity specialists have unveiled refined methods to determine potential abuse of Azure Managed Identities (MIs), addressing a important however typically missed safety concern in cloud environments.

Azure MIs streamline credential administration by eliminating the necessity for guide secret dealing with, but this comfort creates new assault vectors that refined menace actors can exploit to escalate privileges and entry delicate assets.

The methods, documented in a complete analysis paper by Crew Axon, concentrate on figuring out unauthorized entry and malicious use of MIs slightly than simply detecting their existence.

As these identities are more and more applied throughout Azure companies, they current an increasing assault floor which will enable adversaries to pivot throughout environments, achieve unauthorized entry to Microsoft Graph, and extract delicate information from varied Azure assets.

Hunters researchers famous that whereas MIs supply important safety benefits by eliminating static credentials, their potential misuse could be significantly damaging since they function with the implicit belief of Azure’s authentication framework.

The analysis builds upon earlier work, significantly Karl Fossaen’s DEF CON 32 discuss titled “Identification Theft is Not a Joke, Azure!” which initially raised consciousness round MI abuse vectors.

The threat-hunting method detailed within the paper introduces twelve specialised detection queries, every focusing on totally different elements of potential MI abuse.

These queries vary from high-fidelity detections, equivalent to figuring out specific token requests from digital machines, to broader behavioral analyses that flag when MIs entry uncommon assets or exhibit anomalous authentication patterns.

One of the important methods introduced focuses on detecting Microsoft Graph enumeration actions utilizing compromised MIs.

Detection Methodology

This high-fidelity detection technique identifies when a managed id makes anomalously excessive numbers of requests to Microsoft Graph API endpoints – conduct according to reconnaissance exercise by menace actors who’ve gained unauthorized entry to MI tokens.

The corresponding detection question, applied in Snowflake SQL, creates a typical desk expression that identifies suspicious patterns of Graph API entry:-

WITH graph_enum_activity AS (
SELECT MIN(time) AS min_event_time,
MAX(time) AS max_event_time,
user_principal_object_id,
ARRAY_AGG(DISTINCT request_uri) AS distinct_request_uris,
COUNT(*) AS amount_of_requests
FROM RAW.MICROSOFT_GRAPH_ACTIVITY_LOGS
WHERE request_method = ‘GET’
GROUP BY user_principal_object_id, hour_of_events
HAVING amount_of_requests > 60
AND amount_of_endpoint_base > 5
AND amount_of_request_uris > 30
)

The question establishes behavioral thresholds by analyzing request patterns, flagging instances the place managed identities make suspicious numbers of distinct calls to the Graph API inside a brief timeframe.

This detection method proves significantly efficient as a result of legit MIs sometimes show predictable, restricted request patterns to Graph assets, making anomalous enumeration makes an attempt stand out.

Past detection, the analysis additionally particulars sensible steerage for incident investigation and response, together with cross-correlation methods between Azure Signal-in logs, Exercise logs, and Microsoft Graph telemetry to hint the total scope of potential compromises.

By offering these detection methodologies, safety groups achieve very important capabilities to determine potential compromises earlier than attackers can totally exploit their entry to cloud environments and delicate assets.

How SOC Groups Save Time and Effort with ANY.RUN – Dwell webinar for SOC groups and managers

Cyber Security News Tags:Abuse, Azure, Detailed, Detect, Identity, Managed, Researchers, Techniques, ThreatHunting

Post navigation

Previous Post: Earth Ammit Hackers Attacking Using New Tools to Attack Drones Used in Military Sectors
Next Post: CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users

Related Posts

Microsoft Outlook for Windows Bug Leads to Crash While Opening Email Microsoft Outlook for Windows Bug Leads to Crash While Opening Email Cyber Security News
KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique Cyber Security News
Louis Vuitton Hacked – Attackers Stolen Customers Personal Data Louis Vuitton Hacked – Attackers Stolen Customers Personal Data Cyber Security News
Disney Agreed to Pay  Million for Collection Personal Data From Children Disney Agreed to Pay $10 Million for Collection Personal Data From Children Cyber Security News
Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Cyber Security News
Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News