UPDATE (Mar. 18): Mandiant recently observed targeted threat actors modifying mailbox folder permissions of user mailboxes to maintain persistent access to the targeted users' email messages. This stealthy technique is not usually monitored by defenders and provides threat actors a way to access the desired email messages using any compromised credentials. The white paper, blog post and Azure AD Investigator tool have been updated to reflect these findings. Mandiant would like to thank the members of Microsoft’s Detection and Response Team (DART) for their collaboration on this research.
In December 2020, FireEye uncovered and publicly disclosed a widespread attacker campaign that is being tracked as UNC2452. In some, but not all, of the intrusions associated with this campaign where Mandiant has visibility, the attacker used their access to on-premises networks to gain unauthorized access to the victim’s Microsoft 365 environment.
Methodologies that UNC2452 and other threat actors have used to move laterally from on-premises networks to the Microsoft 365 cloud have been detailed in our white paper, Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452. The paper also discusses how organizations can proactively harden their environments and remediate environments where similar techniques have been observed.
Mandiant is releasing an auditing script, Azure AD Investigator, through its GitHub repository that organizations can use to check their Microsoft 365 tenants for indicators of some of the techniques used by UNC2452. The script will alert administrators and security practitioners to artifacts that may require further review to determine if they are truly malicious or part of legitimate activity. Many of the attacker techniques detailed in the white paper are dual-use in nature—they can be used by threat actors but also by legitimate tools. Therefore, a detailed review for specific configuration parameters may be warranted, including correlating and verifying that configurations are aligned with authorized and expected activities.
Mandiant has observed UNC2452 and other threat actors moving laterally to the Microsoft 365 cloud using a combination of four primary techniques:
Read the white paper for a detailed overview of each technique, including practical remediation and hardening strategies, and check out our auditing script, Azure AD Investigator.
FireEye Helix Detection | MITRE Technique | Detection Logic |
MICROSOFT AZURE ACTIVE DIRECTORY [Risky Sign-In] | Alert on suspicious logon activity as detected by Azure Identity Protection | |
OFFICE 365 [Federated Domain Set] | Alert on new domain federation in Office 365 | |
OFFICE 365 [Modified Domain Federation Settings]
| Alert of modification to domain federations settings in Office 365 | |
OFFICE 365 [User Added Credentials to Service Principal] | Alert on addition of certificates or passwords added to Service Principals | |
OFFICE 365 ANALYTICS [Abnormal Logon]
| Alert on suspicious login activity based on heuristics | |
WINDOWS METHODOLOGY [ADFS Dump] | Alert on activity access requests for the AD FS Distributed Key Manager (DKM) container in Active Directory | |
OFFICE 365 [Mailbox Folder Permission Change – Inbox and Top Of Information Store] | Alert on suspicious modifications of mailbox folder permissions for the inbox or top of information store. |
Click to Open Code Editor