-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Possible Forest Blizzard attempted credential harvesting - Sept 2020 #8709
Comments
Thank you for submitting an Issue to the Azure Sentinel GitHub repo! You should expect an initial response to your Issue from the team within 5 business days. Note that this response may be delayed during holiday periods. For urgent, production-affecting issues please raise a support ticket via the Azure Portal. |
Thank you for submitting an Issue to the Azure Sentinel GitHub repo! You should expect an initial response to your Issue from the team within 5 business days. Note that this response may be delayed during holiday periods. For urgent, production-affecting issues please raise a support ticket via the Azure Portal. |
1 similar comment
Thank you for submitting an Issue to the Azure Sentinel GitHub repo! You should expect an initial response to your Issue from the team within 5 business days. Note that this response may be delayed during holiday periods. For urgent, production-affecting issues please raise a support ticket via the Azure Portal. |
Thank you for submitting an Issue to the Azure Sentinel GitHub repo! You should expect an initial response to your Issue from the team within 5 business days. Note that this response may be delayed during holiday periods. For urgent, production-affecting issues please raise a support ticket via the Azure Portal. |
Hello @jonbprogramming, thanks for flagging this issue, we are working on this, will update you shortly, thanks! |
Thank you for submitting an Issue to the Azure Sentinel GitHub repo! You should expect an initial response to your Issue from the team within 5 business days. Note that this response may be delayed during holiday periods. For urgent, production-affecting issues please raise a support ticket via the Azure Portal. |
Hello @jonbprogramming, thanks for flagging this issue, we are working on this, will update you ASAP |
Hello @jonbprogramming, we are working on this issue, and an update will be given shortly. Thanks |
Hi @jonbprogramming, Thank you for reporting the issue, really appreciate it. There are rules to detect Brute Force and Password Spray attacks in Azure Active Directory Solution, which can be used to detect similar attacks. User can use those to cover this scenario. |
@jonbprogramming Gentle reminder,Could you please look in to the steps provided by us and let us know if any other information required
|
Sounds good. I will relay this to the customer. |
Hey everyone, just wanted to ask how a rule being deprecated may come across to the customer? This query is deployed in our environment and doesn't show any markers or indications that it is deprecated |
Describe the bug
I was researching an issue a customer had with running the "Possible Forest Blizzard attempted credential harvesting - Sept 2020" (id: 04384937-e927-4595-8f3c-89ff58ed231f) OOTB query. I discovered that the "RecodType" column references should be represented by 9 for "AzureActiveDirectoryAccountLogon” (also deprecated) and the "AzureActiveDirectoryStsLogon" as “15”. Also, the query references “UserLoggedIn” which I was unable to find in my test tenant and think this may be accomplished with a join to the “SignIn” logs table.
Query Referenced (Possible Forest Blizzard attempted credential harvesting - Sept 2020)
let IPs = dynamic (["199.249.230.","185.220.101.","23.129.64.","109.70.100.","185.220.102."]);
OfficeActivity
| where RecordType in ("AzureActiveDirectoryAccountLogon", "AzureActiveDirectoryStsLogon")
| where Operation != 'UserLoggedIn'
| extend UserAgent = iff(parse_json(ExtendedProperties)[0].Name =~ "UserAgent", extractjson("$[0].Value", ExtendedProperties, typeof(string)),"")
| mv-expand parse_json(ExtendedProperties)
| where ExtendedProperties.Name =~ "RequestType"
| extend RequestType = ExtendedProperties.Value
| where ClientIP has_any (IPs)
| summarize authAttempts=dcount(TimeGenerated), firstAttempt=min(TimeGenerated), lastAttempt=max(TimeGenerated), uniqueIPs=dcount(ClientIP), uniqueAccounts=dcount(UserId), attemptedAccounts=make_set(UserId) by UserAgent
| where authAttempts > 2500
| extend timestamp = firstAttempt
| sort by uniqueAccounts
https://learn.microsoft.com/en-us/office/office-365-management-api/office-365-management-activity-api-schema
https://learn.microsoft.com/en-us/azure/azure-monitor/reference/tables/officeactivity
To Reproduce
Steps to reproduce the behavior:
Run the following query and it should produce no records:
OfficeActivity
| where RecordType in ("AzureActiveDirectoryAccountLogon", "AzureActiveDirectoryStsLogon")
| where Operation != 'UserLoggedIn'
If you add a numerical value for a RecordType that exists in your LA space records will be returned. Example:
OfficeActivity
| where RecordType in ("50")
| where Operation != 'UserLoggedIn'
The query ran to look for 'UserLoggedIn' activity. None was returned:
OfficeActivity
| distinct Operation
| sort by Operation
Expected behavior
I would expect that running the following would return records:
OfficeActivity
| where RecordType in ("AzureActiveDirectoryAccountLogon", "AzureActiveDirectoryStsLogon")
| where Operation != 'UserLoggedIn'
The text was updated successfully, but these errors were encountered: