New Name, Same Exceptional Service! Introducing Lockstep Technology Group

Transformyx: A Lockstep Technology Group Company
Edit Current Layout

Alert (AA21-008A) Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments

CISA • Jan 08, 2021

Alert (AA21-008A) - Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments

Summary

This Alert is a companion alert to AA20-352A: Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations. AA20-352A primarily focuses on an advanced persistent threat (APT) actor’s compromise of SolarWinds Orion products as an initial access vector into networks of U.S. Government agencies, critical infrastructure entities, and private network organizations. As noted in AA20-352A, the Cybersecurity and Infrastructure Security Agency (CISA) has evidence of initial access vectors in addition to the compromised SolarWinds Orion products.


This Alert also addresses activity—irrespective of the initial access vector leveraged—that CISA attributes to an APT actor. Specifically, CISA has seen an APT actor using compromised applications in a victim’s Microsoft 365 (M365)/Azure environment. CISA has also seen this APT actor utilizing additional credentials and Application Programming Interface (API) access to cloud resources of private and public sector organizations. These tactics, techniques, and procedures (TTPs) feature three key components:


  • Compromising or bypassing federated identity solutions;
  • Using forged authentication tokens to move laterally to Microsoft cloud environments; and
  • Using privileged access to a victim’s cloud environment to establish difficult-to-detect persistence mechanisms for Application Programming Interface (API)-based access.


This Alert describes these TTPs and offers an overview of, and guidance on, available open-source tools—including a CISA-developed tool, Sparrow—for network defenders to analyze their Microsoft Azure Active Directory (AD), Office 365 (O365), and M365 environments to detect potentially malicious activity.


Note: this Alert describes artifacts—presented by these attacks—from which CISA has identified detectable evidence of the threat actor’s initial objectives. CISA continues to analyze the threat actor’s follow-on objectives.


For more on this alert please click here.


Ned Fasullo, Manager, Mid-Market Division

For more information:

Email us | Sales@tfmx.com

Call us | 225.761.0088 ext 112


By Ivana Rhodes 19 Dec, 2023
Increasing Efficiency Through Cloud Managed Meraki SD-WAN & Security
By Ivana Rhodes 09 Aug, 2023
Announcing ProComputing to the Lockstep Technology Group Brand!
09 Jun, 2023
Introducing Lockstep: Keeping You a Step Ahead of the Technology Curve
16 Mar, 2022
Lockstep Technology Group, a leading provider of technology solutions for SLED organizations, is adding Transformyx, a leader in technology infrastructure and managed services, to become the leading full-service provider of IT solutions and services focused exclusively on optimizing the IT strategies of organizations in the education, healthcare, government, and commercial sectors across the Southeast. Lockstep and Transformyx share a common purpose to provide technology solutions that enable a robust, scalable, innovative, secure, and highly engaging environment for working and learning. With combined resources, Lockstep, based in Atlanta, GA and Greenville, SC, and Transformyx, based in Baton Rouge, LA, will strengthen their market positions in the Southeast and offer their clients turn-key solutions that include managed services, data & infrastructure, security & compliance, and end point technology solutions. Both organizations take pride in being customer-centric and client obsessed and have partnered with thousands of organizations spanning schools, colleges, healthcare, municipalities, and business over the past decade. “The passion and purpose embodied by the Transformyx team align with everything we do at Lockstep. We’re excited to be able to immediately offer a wide range of technology solutions that enable success.” Mahendran Jawaharlal, CEO, Lockstep Technology Group.
02 Mar, 2022
ASA Powered Managed Security Services
By Ned Fasullo 23 Sep, 2021
During a 2020 study on IT decision makers and C-level executives at enterprise organizations, it was found that 64 percent of respondents believed that those in a senior management positions are the most likely to be targeted by malicious cyber attacks within their organizations. In contrast, only 34 percent of respondents reported freelance support positions as being most likely to be targeted.
By Ned Fasullo 23 Sep, 2021
According to data collected throughout 2020, the most widespread type of mobile malware worldwide were variants from the Agent Tesla family. This accounted for nearly 30 percent of all mobile malware attacks that year. Formbook malware was the second most common type found, followed by those from the family LokiBot.
By Ned Fasullo 23 Sep, 2021
According to data collected throughout 2020, the most prevalent malware threats to corporate networks across the globe that year were from the malware family Emotet, representing 19 percent of all reported attacks. The second highest number of attacks came from the Agent Tesla malware family, followed by Dridex variants.
By Ned Fasullo 23 Sep, 2021
In 2020, the majority of reported botnet attacks globally was caused by malware from the Emotet family. This represented over 30 percent of all attacks. Although an additional 15 and 14 percent of botnet crime was traced to Dridex and Trickbot respectively, 17 percent of attacks that year involved malware from other families.
By Ned Fasullo 23 Sep, 2021
Malware - Statistics & Facts
More Posts
Share by: