Read the original article: Detecting Microsoft 365 and Azure Active Directory Backdoors
Mandiant has seen an uptick in incidents involving Microsoft 365
(M365) and Azure Active Directory (Azure AD). Most of these incidents
are the result of a phishing email coercing a user to enter their
credentials used for accessing M365 into a phishing site. Other
incidents have been a result of password spraying, password stuffing,
or simple brute force attempts against M365 tenants. In almost all of
these incidents, the user or account was not protected by multi-factor
authentication (MFA).
These opportunistic attacks are certainly the most common form of
compromise for M365 and Azure AD, and are usually the initial vector
to establish persistence. During both incident response (IR)
engagements and proactive cloud assessments we are often asked:
- What are some other types of attacks that Mandiant is seeing
against M365 and Azure AD? - Is it possible for an
on-premises compromise to “vertically” move to M365 and Azure
AD? - If a global administrator account is compromised, is it
possible to maintain persistence even after the compromised account
has been detected, a password reset has occurred, and MFA has been
applied?
AADInternals PowerShell Module
In some incidents, Mandiant has witnessed attackers utilizing a
PowerShell module called AADInternals, which can
allow an attacker to vertically move from on-premises to Azure AD,
establish backdoors, steal passwords, generate user security tokens,
and bypass MFA protections. This PowerShell module has allowed
attackers to maintain persistence in the tenant even after initial
eradication efforts were conducted.
To see this module in action and understand how it works, Dr.
Nestori Syynimaa’s PSCONFEU 2020 presentation, Abusing Azure
Active Directory: Who would you like to be today?, provides an
in-depth overview of the module.
To detect the use of AADInternals, it is important to understand how
some of these attacks work. Once an understanding is established,
abnormal usage can be detected through a combination of log analysis
and host-based indicators.
Backdoor 1: Abusing Pass-Through Authentication
Attacker Requirements
- Local Administrative Access to a server running Pass-through
Authentication
Or
- M365 global administrator credentials
The AADInternals PowerShell module contains a function called Install-AADIntPTASPY. The function works by
inserting itself as a man-in-the-middle within the Pass-through
Authentication (PTA) process that occurs between Azure AD and the
server running the PTA Agent in the on-premises environment. Commonly,
the PTA Agent runs on the same on-premises server as Azure AD Connect
(AAD Connect).
When PTA is enabled, every logon that occurs against Azure AD gets
redirected to the PTA Agent on-premises. The PTA Agent asks an
on-premises Active Directory Domain Controller if a password is valid
for an authenticating account. If valid, the PTA Agent responds back
to Azure AD to grant the requestor access. Figure 1 provides the
workflow of Pass-through Authentication and where AADInternals can
intercept the request.
Figure 1: Pass-through Authentication workflow
Once the function is running, every PTA attempt against Azure AD
will be intercepted by the installed AADIntPTASpy module. The module will record the
user’s password attempt and reply back to Azure AD on behalf of the
PTA Agent. This reply advises Azure AD the password attempt was valid
and grants the user access to the cloud, even if the password is
incorrect. If an attacker has implanted AADIntPTASpy, they can log in as any user that
attempts to authenticate using PTA—and will be granted access.
Additionally, all password attempts that are registered by the AADIntPTASpy module are recorded within a log file
on the server (Default location: C:\PTASpy\PTASPy.csv). Figure 2 shows how the log
file can be decoded to reveal a user’s password in cleartext.
Figure 2: PTASpy.csv decoded passwords
Not only will this function allow an attacker to login as any user
who authenticates via PTA, but it will also act as a repository for
collecting user passwords who are legitimately logging into Azure AD.
This could allow an attacker to pivot their attack to other areas of
the network—or use these credentials against other internet accessible
portals that may leverage single-factor authentication (e.g., VPN gateway).
An attacker can use this module in one of two ways:
Method 1: On-Premises Compromise
An attacker has gained access to an on-premises domain and is able
to laterally move to the AADConnect / PTA Agent Server. From this
server, an attacker can potentially leverage the AADInternals
PowerShell module and invoke the Install-AADIntPTASpy function.
Method 2: Cloud Compromise
If an attacker has successfully compromised an Azure AD global admin
account, an attack can be conducted from an attacker’s own
infrastructure. An attacker can install a PTA Agent on a server they
manage and register the agent using the compromised global
administrator account (Figure 3).
Figure 3: Azure AD Portal—registered
Pass-through Authentication agents
Once registered with Azure AD, the rogue server will begin to
intercept and authorize all login attempts. As with Method 1, this
server can also be used to harvest valid credentials.
Backdoor 2: Abusing Identity Federation
Attacker Requirements
- Local administrative access to AD and server running Active
Directory Federation Services
Or
- M365 global administrator credentials
Another method of authenticating to M365 is through the usage of
federation services. When a M365 domain is configured as a federated
domain, a trust is configured between M365 and an external identify
provider. In many cases, this trust is established with an Active
Directory Federation Services (ADFS) server for an on-premises Active
Directory domain.
Once a trust is established, when a user logs into M365 using a
federated domain, their request is redirected to the external identify
provider (ADFS) where their authentication is validated (Figure 4).
Once validated, the ADFS server provides the user a security token.
This token is then trusted by M365 and grants the access to the platform.
Figure 4: Microsoft 365 Federation
Sign-in workflow
AADInternals has a PowerShell function to craft security tokens,
which mimics the ADFS authentication process. When providing the
function a valid UserPrincipalName, Immutable ID and IssuerURI, an
attacker can generate a security token as any user of the tenant.
What’s even more concerning is that once this security token is
generated, this can allow an attacker to bypass MFA.
As with Backdoor 1, this attack can either be performed from a
compromised on-premises environment or from an attacker’s own infrastructure.
Method 1: On-Premises Compromise
Once an attacker has gained access to an on-premises domain with
elevated access, they can begin to collect the required information to
craft their own security tokens to backdoor into M365 as any user. An
attacker will require:
- A valid UserPrincipalName and Immutable.
- Both of these
attributes can be pulled from the on-premises Active Directory
domain.
- Both of these
- IssuerURI of the ADFS server and ADFS
Signing certificate.- This can be obtained from an ADFS
server when directly logged into the server or remotely querying
the server via an privileged account.
- This can be obtained from an ADFS
Once an attacker has collected the necessary information, using the
AADInternals Open-AADIntOffice365Portal
command, a security token for the user can be generated granting an
attacker access to M365 (Figure 5).
Figure 5: AADInternals
Open-AADIntOffice365Portal command
Method 2: Cloud Compromise
If an attacker has a compromised an M365 Global Administrator
account, using their own infrastructure, an attacker can use their
administrative access to collect user information and reconfigure the
tenant to establish their backdoor. In this method, an attacker will require:
- A valid UserPrincipalName and valid ImmutableId.
- Figure 6 shows how the Get-MsolUser command can obtain a user’s
ImmutableId from Azure AD.
- Figure 6 shows how the Get-MsolUser command can obtain a user’s
Figure 6: Get-MsolUser—list user UPN
& ImmutableId
- IssuerURI
- This can be obtained by converting a managed
domain to a federated domain. Figures 7 through 10 show how the
AADInternals ConvertTo-AADIntBackdoor
command (Figure 8) can be used to allow attacker to register
their own IssuerURI for a federated domain.
- This can be obtained by converting a managed
Figure 7: Get-msoldomain—list of
registered domains and authentication
Figure 8:
ConvertTo-AADIntBackdoor—convert domain to federated authentication
Figure 9: Changed authentication method
Figure 10: Azure AD Portal registered domains
Note: To not interrupt production and
authentication with an existing federated domain (and to remain
undetected), an attacker may opt to register a new domain with the tenant.
Figure 11: AADInternals
Open-AADIntOffice365Portal Command using new Federated domain
Once an attacker has properly configured the tenant, using the
ImmutableId of any user, a security token can be generated by
executing the Open-AADIntOffice365Portal
command (Figure 11). This will allow an attacker to login as that user
without the need for a valid certificate or a legitimate IssuerURI.
Fortunately for defenders, this method will generate a number of
events in the unified audit log, which can be leveraged for monitoring
and alerting.
Mitigation and Detection
Once persistence is established, it can be extremely difficult to
detect login activity that is utilizing one of the previously
described methods. In lieu of this, it is recommended to monitor and
alert on M365 unified audit logs and Azure AD sign-in activity to
detect anomalous activity.
Detection in FireEye Helix
Being that Mandiant has seen this methodology being used in the
wild, we felt it was necessary to build these detections into our
FireEye Helix security platform. Helix engineers have created sever
new detection rules that monitor for detectable activity of an
attacker making use of the AADInternals PowerShell module.
The following five rules will monitor a server’s event logs and
alert upon the installation and usage of the AADInternals PowerShell
module (Figure 12). The detection of these activities could be high
fidelity alerts that an attacker is preparing to configure backdoors
into M365 and Azure AD environments.
Figure 12: AADInternals Helix rules
If an attacker has successfully configured a backdoor using
AADInternals, Helix will alert upon the following events registered in
the Office 365 unified audit log and Azure Activity Log as indication
of a possible event (Figure 13 and Figure 14). It is important to note
that these alerts could be triggered upon legitimate administrator
activity. When responding to these alerts, first check with your M365
and Azure AD administrator to verify the activity before raising a
security event.
Figure 13: Office 365 and Azure Helix rules
Figure 14: PTA Connector Registered alert description
Hunting for Backdoors in M365 Unified Audit Logs and Azure AD Logs
If you suspect a global administrator account was compromised and
you want to review Azure AD for indicators of potential abuse, the
following should be reviewed (note that these same concepts can be
used for proactive log monitoring):
- From Azure AD Sign-ins logs, monitor logon activity from
On-Premises Directory Synchronization Service Accounts. This account
is used by the Azure AD Connect service (Figure 15).
Figure 15: Azure AD Sign-ins
- Baseline the IP addresses used by this account and make sure
the IPs match those assigned to the on-premises WAN infrastructure.
If the attacker has configure a PTA Agent on their own
infrastructure, seeing an IP that does not match your baseline could
be an indicator that a rogue PTA Agent has been configured by the
attacker (Figure 16).
Figure 16: Azure AD Sign-in
logs—On-Premises Directory Synchronization Services account
From Azure AD Sign-ins, monitor and
baseline Azure AD Sign-ins to the Azu
[…]
Read the original article: Detecting Microsoft 365 and Azure Active Directory Backdoors