heroui logo

Possible Consent Grant Attack via Azure-Registered Application

Elastic Detection Rules

View Source
Summary
The rule titled 'Possible Consent Grant Attack via Azure-Registered Application' aims to detect incidents where a user or administrator grants permissions to an unauthorized Azure-registered application. This type of attack may be executed by adversaries who create malicious applications that request sensitive data access like email and documents. Users may be tricked into granting these applications consent through social engineering tactics such as phishing or scripting on trusted websites. Once consent is granted, these applications can access user data without requiring further organizational authentication, making standard remediation approaches ineffective. Analysts are encouraged to review application permissions through the Azure AD portal to identify unauthorized access, focusing on the permissions requested by applications and assessing their risk characteristics, such as download counts and ratings. Official Microsoft resources for detection and remediation are provided within the rule. The setup requires integration with Azure Fleet and Filebeat for effective monitoring of permission granting actions within the Azure environment.
Categories
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Cloud Service
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1566
  • T1566.002
  • T1528
Created: 2020-09-01