Forum Discussion
Investigating Storm-0558 security issue?
For those that've heard, any idea how we can investigate tokens?
https://www.wiz.io/blog/storm-0558-compromised-microsoft-key-enables-authentication-of-countless-micr article advises to:
Examine suspicious authentication attempts via OpenID tokens signed by the compromised key. This can be done by unpacking the access tokens used against the application and searching for the string 1LTMzakihiRla_8z2BEJVXeWMqo within the kid field of the JOSE Header.
We have identified potentially affected apps so that's a first step.
Thanks for your input.
5 Replies
- GohulanBrass ContributorExamine suspicious authentication attempts using OpenID tokens signed by the compromised key. To do this, unpack the access tokens used against the application and search for the string "1LTMzakihiRla_8z2BEJVXeWMqo" within the "kid" field of the JOSE Header.
Gohulan "To do this, unpack the access tokens used against the application and search for the string" > can you give me more details what should i do like a Azure CLI command or something?
- colonel_claypooIron Contributor
The more I read about it the more I get the hunch that remediation steps can only be carried out on the app developer's side. We are customers using this, for the most part, enterprise applications/app registrations. Don't if we can do anything here at all. What do you think?