시가총액: $3.774T 1.890%
거래량(24시간): $117.0644B 9.650%
  • 시가총액: $3.774T 1.890%
  • 거래량(24시간): $117.0644B 9.650%
  • 공포와 탐욕 지수:
  • 시가총액: $3.774T 1.890%
암호화
주제
암호화
소식
cryptostopics
비디오
최고의 뉴스
암호화
주제
암호화
소식
cryptostopics
비디오
bitcoin
bitcoin

$114720.362772 USD

-0.06%

ethereum
ethereum

$3679.931631 USD

3.08%

xrp
xrp

$3.057833 USD

1.50%

tether
tether

$0.999889 USD

-0.02%

bnb
bnb

$766.427054 USD

1.33%

solana
solana

$169.325846 USD

3.04%

usd-coin
usd-coin

$0.999801 USD

0.01%

tron
tron

$0.334792 USD

2.22%

dogecoin
dogecoin

$0.208867 USD

3.09%

cardano
cardano

$0.753413 USD

1.95%

hyperliquid
hyperliquid

$38.743306 USD

0.17%

stellar
stellar

$0.410709 USD

-0.43%

sui
sui

$3.557841 USD

1.67%

chainlink
chainlink

$16.944222 USD

1.95%

bitcoin-cash
bitcoin-cash

$571.484092 USD

3.65%

암호화폐 뉴스 기사

Mastering Azure Managed Identities: Attack & Defense, Part 2

2025/05/14 17:15

Mastering Azure Managed Identities: Attack & Defense, Part 2

A group of cybersecurity specialists from Hunters, operating under the prestigious Team Axon banner, have unveiled advanced threat-hunting techniques in a groundbreaking research paper titled “Mastering Azure Managed Identities: Attack & Defense, Part 2.”

This research builds upon their prior work on offensive tradecraft for exploiting misconfigured Managed Identities (MIs), covered in Part 1, to present a focused analysis of defensive tradecraft aimed at identifying and preventing the misuse of MIs.

As discussed previously, while MIs are designed to simplify credential management for Azure services, they also present a potential attack vector when misconfigured or compromised.

This latest paper, presented at the beginning of August 2023, continues where their offensive research left off, shifting focus to equipping security teams with actionable tools to safeguard their Azure ecosystems against identity-based threats.

The researchers explore the complexities of identifying and tracking both System-Assigned Managed Identities (SAMIs) and User-Assigned Managed Identities (UAMIs) using multiple Azure log sources.

These include Azure Sign-In, Audit, and Activity Logs, as well as Microsoft Graph Activity Logs.

By meticulously mapping MIs through methods like querying Azure CLI, reviewing the Azure Portal, and analyzing log data, the paper provides a robust foundation for inventorying these non-human identities (NHIs).

However, the true highlight is the development of twelve high-to-medium fidelity hunting queries crafted in Snowflake SQL.

These queries are designed to detect suspicious behaviors such as explicit token requests from virtual machines (VMs), enumeration via Microsoft Graph, and token usage from unusual IP addresses or endpoints.

Importantly, these queries are service-agnostic, concentrating on behavioral anomalies rather than narrow, service-specific logs, ensuring broader applicability across Azure environments.

For instance, one query correlates MI sign-ins with host-based events to flag instances where an attacker might be attempting to request a token for a specific service from a VM.

Another query serves to baseline normal actions taken by an MI, aiming to identify any deviations that could indicate an attacker attempting to escalate privileges or perform lateral movement.

The paper also underscores the importance of incident investigation, offering detailed guidelines for tracing compromised MIs.

This includes analyzing token requests, correlating activities across log sources using unique token identifiers, and assessing the blast radius of permissions granted to the compromised MI.

Complementary logs from services like Azure Key Vault and Storage can be used to further investigate any unauthorized access to sensitive resources.

By integrating these defensive strategies, the research endeavors to address the often-overlooked risks posed by NHIs, which form a critical part of the cloud attack surface.

Team Axon's contribution builds on prior work by NetSPI and other community researchers, like Karl Fossaen's DEF CON 32 talk, to push the boundaries of Azure security even further.

The researchers note that their efforts are powered by Hunters' AI-powered SOC platform, which aims to automate detection and response, especially relevant for smaller security teams that may not have the same breadth of resources.

Overall, this research not only sparks new ideas but also delivers practical, immediately usable tools to stay ahead of evolving identity threats in the cloud.

원본 소스:gbhackers

부인 성명:info@kdj.com

제공된 정보는 거래 조언이 아닙니다. kdj.com은 이 기사에 제공된 정보를 기반으로 이루어진 투자에 대해 어떠한 책임도 지지 않습니다. 암호화폐는 변동성이 매우 높으므로 철저한 조사 후 신중하게 투자하는 것이 좋습니다!

본 웹사이트에 사용된 내용이 귀하의 저작권을 침해한다고 판단되는 경우, 즉시 당사(info@kdj.com)로 연락주시면 즉시 삭제하도록 하겠습니다.

2025年08月05日 에 게재된 다른 기사