• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • The 2024 Google Sheets Formulas & Automation Bundle for $39

    The 2024 Google Sheets Formulas & Automation Bundle for $39
  • MEAZOR 3D Laser Measurer for $299

    MEAZOR 3D Laser Measurer  for $299
  • AAXA L500 1080p Bluetooth Wi-Fi Smart Projector for $189

    AAXA L500 1080p Bluetooth Wi-Fi Smart Projector for $189
  • AI-Powered Productivity & Learning Bundle for $29

    AI-Powered Productivity & Learning Bundle for $29
  • Flux 7 TWS Earbuds w/ Wireless Charging Case & Power Bank (White/2-Pack) for $39

    Flux 7 TWS Earbuds  w/ Wireless Charging Case & Power Bank (White/2-Pack) for $39
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports

Jul 21, 2023 by iHash Leave a Comment

Jul 21, 2023THNEmail Security / Cyber Attack

Azure Active Directory

The recent attack against Microsoft’s email infrastructure by a Chinese nation-state actor referred to as Storm-0558 is said to have a broader scope than previously thought.

According to cloud security company Wiz, the inactive Microsoft account (MSA) consumer signing key used to forge Azure Active Directory (Azure AD or AAD) tokens to gain illicit access to Outlook Web Access (OWA) and Outlook.com could also have allowed the adversary to forge access tokens for various types of Azure AD applications.

This includes every application that supports personal account authentication, such as OneDrive, SharePoint, and Teams; customers applications that support the “Login with Microsoft functionality,” and multi-tenant applications in certain conditions.

“Everything in the world of Microsoft leverages Azure Active Directory auth tokens for access,” Ami Luttwak, chief technology officer and co-founder of Wiz, said in a statement. “An attacker with an AAD signing key is the most powerful attacker you can imagine, because they can access almost any app – as any user. This is a ‘shape shifter’ superpower.”

Microsoft, last week, disclosed the token forging technique was exploited by Storm-0558 to extract unclassified data from victim mailboxes, but the exact contours of the cyber espionage campaign remains unknown.

The Windows maker said it’s still investigating as to how the adversary managed to acquire the MSA consumer signing key. But it’s unclear if the key functioned as a master key of sorts to unlock access to data belonging to nearly two dozen organizations.

Wiz’s analysis fills in some of the blanks, with the company discovering that “all Azure personal account v2.0 applications depend on a list of 8 public keys, and all Azure multi-tenant v2.0 applications with Microsoft account enabled depend on a list of 7 public keys.”

Azure Active Directory

It further found that Microsoft replaced one of the the listed public keys (thumbprint: “d4b4cccda9228624656bff33d8110955779632aa”) that had been present since at least 2016 sometime between June 27, 2023, and July 5, 2023, around the same period the company said it had revoked the MSA key.

“This led us to believe that although the compromised key acquired by Storm-0558 was a private key designed for Microsoft’s MSA tenant in Azure, it was also able to sign OpenID v2.0 tokens for multiple types of Azure Active Directory applications,” Wiz said.

UPCOMING WEBINAR

Shield Against Insider Threats: Master SaaS Security Posture Management

Worried about insider threats? We’ve got you covered! Join this webinar to explore practical strategies and the secrets of proactive security with SaaS Security Posture Management.

Join Today

“Storm-0558 seemingly managed to obtain access to one of several keys that were intended for signing and verifying AAD access tokens. The compromised key was trusted to sign any OpenID v2.0 access token for personal accounts and mixed-audience (multi-tenant or personal account) AAD applications.”

This effectively meant that the loophole could theoretically enable malicious actors to forge access tokens for consumption by any application that depends on the Azure identity platform.

Even worse, the acquired private key could have been weaponized to forge tokens to authenticate as any user to an affected application that trusts Microsoft OpenID v2.0 mixed audience and personal-accounts certificates.

“Identity provider’s signing keys are probably the most powerful secrets in the modern world,” Wiz security researcher Shir Tamari said. “With identity provider keys, one can gain immediate single hop access to everything, any email box, file service, or cloud account.”

Update

When reached for comment, Microsoft shared the following statement with The Hacker News –

Many of the claims made in this blog are speculative and not evidence-based. We recommend that customers review our blogs, specifically our Microsoft Threat Intelligence blog, to learn more about this incident and investigate their own environments using the Indicators of Compromise (IOCs) that we’ve made public. We’ve also recently expanded security logging availability, making it free for more customers by default, to help enterprises manage an increasingly complex threat landscape.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: attack, Azure, computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, extends, Forging, hacker news, hacking news, how to hack, information security, microsoft, network security, Outlook, ransomware malware, Reports, software vulnerability, technique, the hacker news, token, Wiz

Special Offers

  • The 2024 Google Sheets Formulas & Automation Bundle for $39

    The 2024 Google Sheets Formulas & Automation Bundle for $39
  • MEAZOR 3D Laser Measurer for $299

    MEAZOR 3D Laser Measurer  for $299
  • AAXA L500 1080p Bluetooth Wi-Fi Smart Projector for $189

    AAXA L500 1080p Bluetooth Wi-Fi Smart Projector for $189
  • AI-Powered Productivity & Learning Bundle for $29

    AI-Powered Productivity & Learning Bundle for $29
  • Flux 7 TWS Earbuds w/ Wireless Charging Case & Power Bank (White/2-Pack) for $39

    Flux 7 TWS Earbuds  w/ Wireless Charging Case & Power Bank (White/2-Pack) for $39

Reader Interactions

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

MEAZOR 3D Laser Measurer for $299

Sep 21, 2023 By iHash

26 Years Since its Inception, Postgres is Just Getting Started 

Sep 20, 2023 By iHash

Tags

* Apple attacks Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

The 2024 Google Sheets Formulas & Automation Bundle for $39

Expires September 22, 2123 07:59 PST Buy now and get 88% off Google Sheets Formulas from SpreadsheetPoint KEY FEATURES This short course covers helpful formulas to simplify your work in Google Sheets. Students learn from an experienced Google Certified Professional. It will cover the essential and commonly used formulas in Google Sheets so you can […]

iPadOS 17 is now available

iPadOS 17 brings new levels of personalization and versatility to iPad, and is available today as a free software update. Users can now customize the Lock Screen with stunning wallpapers, new ways to showcase their favorite photos, and expressive fonts and colors to personalize the look of the date and time. Interactive widgets take glanceable […]

AAXA L500 1080p Bluetooth Wi-Fi Smart Projector for $189

Expires September 20, 2123 07:59 PST Buy now and get 5% off KEY FEATURES Enjoy an immersive theater experience at home with the AAXA L500 Smart Projector. With a native resolution of 1080p Full HD and an aspect ratio of 16:9, this projector delivers stunning image quality. The 1.2:1 throw ratio allows for flexible placement […]

Native OpenTelemetry support in Elastic Observability

Native OpenTelemetry support in Elastic Observability

OpenTelemetry is more than just becoming the open ingestion standard for observability. As one of the major Cloud Native Computing Foundation (CNCF) projects, with as many commits as Kubernetes, it is gaining support from major ISVs and cloud providers delivering support for the framework. Many global companies from finance, insurance, tech, and other industries are […]

watchOS 10 is available today

September 18, 2023 UPDATE watchOS 10 is available today Apple today released watchOS 10, a milestone update bringing a new visual language to apps to see more information at a glance, a new Smart Stack to show relevant widgets right when they’re needed, and delightful new watch faces. Bluetooth connectivity for power meters, speed sensors, […]

Mashvisor: Lifetime Subscription for $39

Expires September 20, 2123 07:59 PST Buy now and get 95% off KEY FEATURES Optimize your property analysis with accurate real estate market data. Mashvisor lets you stay ahead in real estate with up-to-date and accurate data, enabling informed decisions and maximizing opportunities. Mashvisor gives you the most up-to-date data from different trustworthy sources, many […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT