{"id":90419,"date":"2020-01-07T09:00:53","date_gmt":"2020-01-07T17:00:53","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90419"},"modified":"2023-09-26T08:39:16","modified_gmt":"2023-09-26T15:39:16","slug":"threat-hunting-azure-advanced-threat-protection","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/07\/threat-hunting-azure-advanced-threat-protection\/","title":{"rendered":"Threat hunting in Azure Advanced Threat Protection (ATP)"},"content":{"rendered":"
As members of Microsoft\u2019s Detection and Response Team (DART),\u00a0we\u2019ve seen a significant increase in adversaries \u201cliving off the land\u201d and using compromised account credentials for malicious purposes. From an investigation standpoint, tracking adversaries using this method is quite difficult as you need to sift through the data to determine whether the activities are being performed by the legitimate user or a bad actor. Credentials can be harvested in numerous ways, including phishing campaigns, Mimikatz, and key loggers.<\/p>\n
Recently, DART was called into an engagement where the adversary had a foothold within the on-premises network, which had been gained through compromising cloud credentials. Once the adversary had the credentials, they began their reconnaissance on the network by searching for documents about VPN remote access and other access methods stored on a user\u2019s SharePoint and OneDrive. After the adversary was able to access the network through the company\u2019s VPN, they moved laterally throughout the environment using legitimate user credentials harvested during a phishing campaign.<\/p>\n
Once our team was able to determine the initially compromised accounts, we were able to begin the process of tracking the adversary within the on-premises systems. Looking at the initial VPN logs, we identified the starting point for our investigation. Typically, in this kind of investigation, your team would need to dive deeper into individual machine event logs, looking for remote access activities and movements, as well as looking at any domain controller logs that could help highlight the credentials used by the attacker(s).<\/p>\n
Luckily for us, this customer had deployed Azure Advanced Threat Protection (ATP)<\/a> prior to the incident. By having Azure ATP operational prior to an incident, the software had already normalized authentication and identity transactions within the customer network. DART began querying the suspected compromised credentials within Azure ATP, which provided us with a broad swath of authentication-related activities on the network and helped us build an initial timeline of events and activities performed by the adversary, including:<\/p>\n \n Detect and investigate advanced attacks on-premises and in the cloud.<\/p>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t This data enabled the team to perform more in-depth analysis on both user and machine level logs for the systems the adversary-controlled account touched. Azure ATP\u2019s ability\u00a0to identify and investigate suspicious user activities and advanced attack techniques throughout the cyber kill chain enabled our team to completely track the adversary\u2019s movements in less than a day. Without Azure ATP, investigating this incident could have taken weeks\u2014or even months\u2014since the data sources don\u2019t often exist to make this type of rapid response and investigation possible.<\/p>\n Once we were able to track the user throughout the environment, we were able to correlate that data with Microsoft Defender ATP<\/a> to gain an understanding of the tools used by the adversary throughout their journey. Using the right tools for the job allowed DART to jump start the investigation; identify the compromised accounts, compromised systems, other systems at risk, and the tools being used by the adversaries; and provide the customer with the needed information to recover from the incident faster and get back to business.<\/p>\n Learn more about how\u00a0DART<\/a>\u00a0helps customers respond to compromises and become cyber-resilient. Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" DART was called into an engagement where the adversary had a foothold within the on-premises network, which had been gained through compromising cloud credentials. Luckily, this customer had deployed Azure ATP prior to the incident and it had already normalized authentication and identity transactions within the customer network.<\/p>\n","protected":false},"author":96,"featured_media":90423,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"content-type":[3662],"topic":[3688],"products":[3690,3694,3696],"threat-intelligence":[],"tags":[],"coauthors":[2134,2108],"class_list":["post-90419","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-threat-trends","products-microsoft-defender","products-microsoft-defender-for-endpoint","products-microsoft-defender-for-identity"],"yoast_head":"\n\n
\t\t\t\t<\/div>\n\t\t\t\n\t\t\t
Azure Advanced Threat Protection<\/h2>\n\n\t\t\t\t\t
Learn more and keep updated<\/h3>\n