
Summary
This detection rule identifies unusual activity in Azure environments where a single user or service principal deletes multiple Azure Storage Accounts in a short timeframe. Such behavior raises significant alarms as it may indicate malicious activities such as denial of service attacks, evidence destruction, or other destructive actions like ransomware. Legitimate deletion of multiple storage accounts is typically rare and is often tightly controlled, hence the detection aims to separate malicious actions from legitimate maintenance activities. False positives can occur during legitimate infrastructure clean-up or automated management processes, hence careful validation is required to ensure that the alerts correspond to improprieties. Recommended investigation steps include examining Azure activity logs for user identification, timing of deletions, and confirming against approved organizational processes. In cases of unauthorized deletions, immediate remediative steps should be undertaken to safeguard the environment and data.
Categories
- Cloud
- Infrastructure
Data Sources
- Cloud Service
- Logon Session
ATT&CK Techniques
- T1485
- T1489
Created: 2025-10-08