heroui logo

Suspicious Azure Sign-in via Visual Studio Code

Elastic Detection Rules

View Source
Summary
The detection rule targets suspicious sign-in activities in Azure involving Visual Studio Code's `client_id` and `Microsoft Graph`. It aims to identify possible phishing attempts where attackers leverage Visual Studio Code to authenticate. The rule analyzes Azure Sign-In and Activity Logs, focusing on unsuccessful login attempts associated with specific applications. Key investigation steps include checking the source IP for malicious activity, identifying affected user accounts, and examining authentication methods and error codes. False positives may arise from legitimate automated scripts or corporate proxies. Recommendations for response include blocking malicious IPs, enforcing stronger password policies, and enabling multi-factor authentication (MFA). Long-term mitigation involves implementing zero-trust frameworks and regularly auditing authentication logs.
Categories
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Cloud Service
  • Application Log
  • Logon Session
ATT&CK Techniques
  • T1078
Created: 2025-04-23