Dec 20 2017
10:30 AM
- last edited on
May 24 2021
02:33 PM
by
TechCommunityAP
Dec 20 2017
10:30 AM
- last edited on
May 24 2021
02:33 PM
by
TechCommunityAP
Earlier this year, Rob Mead wrote a great article on the techniques used at scale by Azure Security Center to detect threats. In this post, we’ll go into the details on one such example, enabling Azure Security Center to detect usage of backdoor user account creation.
Backdoor user accounts are those accounts that are created by an adversary as part of the attack, to be used later in order to gain access to other resources in the network, open new entry points into the network as well as achieve persistency. MITRE lists the create account tactic as part of the credentials access intent of stage and lists several toolkits that uses this technique.
Read about it in the Azure blog.