heroui logo

Azure Storage Account Blob Public Access Enabled

Elastic Detection Rules

View Source
Summary
This rule is designed to detect when public access is enabled on Azure Storage Account Blobs, a configuration that can allow external, unauthorized access to sensitive data stored in blob containers. It tracks the 'MICROSOFT.STORAGE/STORAGEACCOUNTS/WRITE' event, specifically looking for successful configuration changes where the 'allowBlobPublicAccess' setting is set to true. This behavior has been associated with cloud ransom-based campaigns, specifically noted in the STORM-0501 group, where attackers manipulate storage settings to facilitate data exfiltration while staying undetected. To mitigate false positives, storage administrators must ensure that such configurations align with organizational policies for public content hosting, CDN requirements, or specific approved projects. Investigative steps include reviewing the Azure activity logs, correlating the changes with other potential malicious activities, and understanding the context of modifications made to storage account configurations.
Categories
  • Cloud
  • Infrastructure
  • Azure
Data Sources
  • Cloud Service
  • Logon Session
  • Network Traffic
  • Application Log
  • File
ATT&CK Techniques
  • T1530
Created: 2025-09-22