MORALLY INDEFENSIBLE BY BRADLEY MILBURN
MORALLY INDEFENSIBLE
Microsoft, On January 12th detected an uninvited & dangerous guest in its IT systems. Within a few days it attributed the raid on emails of its “senior leadership” and cybersecurity team to Russia’s Foreign Intelligence Service.
The group has been attacking IT service providers in both Europe and the US.
On 25 January, Microsoft published a quick analysis of how Russia's Foregin Intelligence Service hit its systems and said it was notifying other victims.
Below is an understanding of what has happened, some informed speculation about the attackers’ lateral movement that may be useful for network defenders.
1. Russia's Foregin Intelligence Service breached a Microsoft “test tenant” account. It was left sitting with no MFA and without a robust password. They tailored their “password spray” attacks to a limited number of accounts, using a low number of attempts to evade detection and avoid blocks based on the volume of failures. They attacked through a “distributed residential proxy infrastructure”. Routing traffic through a “vast number” of IP addresses to evade detection. Eventually they had it cracked.
2. Once they compromised a user account, they found a “legacy” test OAuth application that had “elevated access to the Microsoft corporate environment.” The name of the application is yet unkown. The Russia's Foregin Intelligence Service then put together new malicious OAuth applications, Then a new user account to grant consent to them and landed the Office 365 Exchange Online ''full_access_as_app role'' which in turn allows access to mailboxes.
Microsoft are yet to disclose a full report of the entire case.
Opinion: I found this case very interesting, hopefully soon there will be more information disclosed, I dont think the Microsoft security professionals would leave such an easily fixable & honestly quite blatant access point for potential threats.
Comments
Post a Comment