{"id":101727,"date":"2021-11-22T10:00:11","date_gmt":"2021-11-22T18:00:11","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=101727"},"modified":"2023-08-07T15:23:41","modified_gmt":"2023-08-07T22:23:41","slug":"how-to-investigate-service-provider-trust-chains-in-the-cloud","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/11\/22\/how-to-investigate-service-provider-trust-chains-in-the-cloud\/","title":{"rendered":"How to investigate service provider trust chains in the cloud"},"content":{"rendered":"

In a recent Microsoft blog post<\/a>, we documented technical guidance for organizations to protect themselves from the latest NOBELIUM activity that was found to target technology service providers, which are privileged in their downstream customer tenants, as a method to gain access to their downstream customers and other organizations within the trust chain.<\/p>\n

Microsoft Detection and Response Team (DART) has been assisting multiple organizations around the world in investigating the impact of NOBELIUM\u2019s activities. While we have already engaged directly with affected customers to assist with incident response related to NOBELIUM\u2019s recent activity, our goal with this blog is to help you answer the common and fundamental questions: How do I determine if I am a victim? If I am a victim, what did the threat actor do? How can I regain control over my environment and make it more difficult for this threat actor to regain access to our environments?<\/p>\n

This blog outlines steps incident responders can take to investigate potential abuse of these delegated admin permissions, independent of the threat actor. In this blog, we\u2019ll cover:<\/p>\n