<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Security Experts Blog articles</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/bg-p/MicrosoftSecurityExperts</link>
    <description>Microsoft Security Experts Blog articles</description>
    <pubDate>Sun, 03 May 2026 17:02:53 GMT</pubDate>
    <dc:creator>MicrosoftSecurityExperts</dc:creator>
    <dc:date>2026-05-03T17:02:53Z</dc:date>
    <item>
      <title>EDR coexistence by design: A practical starting point to Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/edr-coexistence-by-design-a-practical-starting-point-to-defender/ba-p/4515265</link>
      <description>&lt;H5&gt;&lt;STRONG&gt;Co-authors: Kayla Rohde &amp;amp; &lt;SPAN data-teams="true"&gt;Kenneth Johnson&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Having multiple cybersecurity technologies, controls, systems, and stakeholders operating together without conflict is not a temporary inconvenience. It is how real environments operate and a practical way to make progress without disruption.&lt;/P&gt;
&lt;P&gt;Complexity exists because businesses are complex. Endpoint platforms already deployed, are relied upon 24/7. Moreover, contracts and operational dependencies make them challenging to change. On the other hand, many organizations already own Microsoft licensing that entitles them to Defender endpoint capabilities, including the ability to run Microsoft Defender for Endpoint in passive mode with EDR capabilities enabled.&lt;/P&gt;
&lt;P&gt;Increasingly, organizations are finding that coexistence can deliver meaningful security outcomes. In addition, when designed with purpose, coexistence allows teams to being realizing the value of their existing Microsoft licensing, strengthen detection and response, and build confidence in Defender under real-world operating conditions.&lt;/P&gt;
&lt;P&gt;In practice, once teams see the depth of signal, investigation quality, and platform integration that Defender provides, most will migrate over and use it as their primary endpoint security platform once the technical, operational, and economic timing makes sense.&lt;/P&gt;
&lt;H1&gt;Side-by-side is not standing still&lt;/H1&gt;
&lt;P&gt;A common assumption is that side by side deployment exists only as a short bridge to replacement. That assumption does not hold up in real environments.&lt;/P&gt;
&lt;P&gt;Experienced teams use coexistence as a controlled transition model that produces immediate security outcomes while preserving operational stability.&lt;/P&gt;
&lt;P&gt;Running Defender alongside an existing prevention platform allows organizations to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Activate endpoint telemetry and behavioral detections already included in licensing&lt;/LI&gt;
&lt;LI&gt;Expand investigative depth without disrupting the current prevention layer&lt;/LI&gt;
&lt;LI&gt;Validate detection coverage before making enforcement changes&lt;/LI&gt;
&lt;LI&gt;Build operational familiarity with Defender workflows under real conditions&lt;/LI&gt;
&lt;LI&gt;Maintain visibility during periods of architectural change&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Coexistence is not about running two tools. It is about sequencing risk reduction with intent.&lt;/P&gt;
&lt;H1&gt;What Passive Mode actually means for your SOC&lt;/H1&gt;
&lt;P&gt;One of the most persistent points of confusion is what “passive mode” actually entails.&lt;/P&gt;
&lt;P&gt;When Defender operates in passive mode:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;It is not the real‑time blocking engine&lt;/LI&gt;
&lt;LI&gt;Another platform remains the primary prevention control&lt;/LI&gt;
&lt;LI&gt;EDR capabilities continue to collect telemetry, generate detections, and support investigation&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For seasoned practitioners, this distinction matters. Many of the most consequential security decisions happen after execution, when responders need clarity, context, and speed. Defender endpoint capabilities contribute directly in that phase, regardless of which tool owns real‑time blocking. This is why coexistence works. It preserves prevention continuity while materially improving detection and response.&lt;/P&gt;
&lt;H1&gt;Turning licensed capability into operational advantage&lt;/H1&gt;
&lt;P&gt;The real value of Defender for Endpoint in a coexistence model is not just what it observes on the endpoint. It is how that signal connects across the Microsoft security platform to produce a more complete picture of attacker behavior.&lt;/P&gt;
&lt;P&gt;Even in passive mode, MDE is not a standalone sensor. Endpoint telemetry feeds into a system that correlates identity, email, cloud, and data signals into a unified investigation experience. That is where the advantage compounds.&lt;/P&gt;
&lt;P&gt;As organizations begin to operationalize MDE in coexistence scenarios, endpoint telemetry does more than generate alerts. It enriches incidents with process level and device context, then ties that activity to identity signals such as risky sign ins, anomalous sessions, and lateral movement patterns. Email events and user interaction history align with execution timelines. Data access and sensitivity context introduce impact.&lt;/P&gt;
&lt;P&gt;The result is not more “noise”. It is better context. What changes is not just visibility. It is decision quality. Process execution is no longer evaluated in isolation. It is tied to a user, a session, an originating communication, and the data that may have been accessed or exposed. Investigations become faster, more confident, and more defensible.&lt;/P&gt;
&lt;P&gt;This is especially relevant for organizations already licensed for Microsoft 365 E5 or equivalent that have not enabled Defender for Endpoint. In those environments, coexistence is not introducing another tool. It is activating an intelligence layer that already exists and is not yet contributing signal.&lt;/P&gt;
&lt;P&gt;Once that signal is connected, a suspicious process execution becomes materially richer. It can be correlated to a user’s sign in risk posture, traced back to an originating email or phishing thread, enriched with device exposure and vulnerability context, and evaluated against sensitive data access.&lt;/P&gt;
&lt;P&gt;That is a fundamentally different investigation than what a siloed endpoint alert produces. Passive mode does not diminish this value. It enables it. Organizations can establish a unified detection and investigation layer while preserving their existing prevention controls. Isolated telemetry becomes an operational signal. Signal becomes a coordinated response.&lt;/P&gt;
&lt;P&gt;For teams that have not yet enabled MDE, the gap is not capability. It is visibility that is already licensed, already available, and not yet being used.&lt;/P&gt;
&lt;H1&gt;From entitlement to enforcement: A resilience arc&lt;/H1&gt;
&lt;P&gt;Cyber resilience is not about assuming controls never fail. It’s about maintaining visibility, decision quality, and response speed when they do.&lt;/P&gt;
&lt;P&gt;Using Defender Endpoint capabilities in a side‑by‑side model:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Improves resilience during periods of change&lt;/LI&gt;
&lt;LI&gt;Reduces dependency on a single control plane&lt;/LI&gt;
&lt;LI&gt;Allows teams to mature detection and response before altering enforcement ownership&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Over time, many organizations choose to simplify. Layering builds resilience while teams learn. Platform consolidation sustains it once confidence is earned.&lt;/P&gt;
&lt;P&gt;We focused on coexistence because it reflects where many organizations begin, not because it is where they should end. Many teams already have endpoint protection in place and licensing that entitles them to Defender Endpoint Capabilities. Coexistence allows those capabilities to be turned on, understood, and used effectively without forcing premature decisions or unnecessary disruption. It creates a practical on‑ramp that lets teams build confidence, improve detection and response, and establish operational muscle before making broader platform choices.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more: MDE side-by-side guidance:&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/mde-side-by-side" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/defender-endpoint/mde-side-by-side&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 17:27:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/edr-coexistence-by-design-a-practical-starting-point-to-defender/ba-p/4515265</guid>
      <dc:creator>Raae_</dc:creator>
      <dc:date>2026-04-30T17:27:14Z</dc:date>
    </item>
    <item>
      <title>When the shield becomes the sword: How misconfigured PAM bridges the tiering model</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/when-the-shield-becomes-the-sword-how-misconfigured-pam-bridges/ba-p/4509392</link>
      <description>&lt;P&gt;In the world of identity security, few tools promise as much peace of mind as Privileged Access Management (PAM). It is often referred to as the "vault" that locks away your kingdom's keys. However, in Microsoft Incident Response – the Detection and Response Team (DART) engagements, we frequently encounter a paradox: the tool used to secure Tier 0 often becomes a quick path for threat actors to compromise it.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;In a recent DART engagement, a&amp;nbsp;threat actor&amp;nbsp;moved from a compromised helpdesk workstation to full domain compromise in under four hours. They&amp;nbsp;didn't&amp;nbsp;use a zero-day. They used the organization's PAM server.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We have seen this story play out in real-time. An organization invests heavily in&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-access-model" target="_blank"&gt;Active Directory (AD) Tiering&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and a premium PAM solution. They feel secure. Yet, during an incident, we trace the&amp;nbsp;threat&amp;nbsp;actor’s&amp;nbsp;path and find they&amp;nbsp;didn't&amp;nbsp;burn a zero-day or crack a complex algorithm. They simply walked across a bridge the organization built themselves: a PAM server positioned in Tier 1 that held the keys to Tier 0.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This&amp;nbsp;isn't&amp;nbsp;a failure of the product;&amp;nbsp;it's&amp;nbsp;a failure of&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;positioning&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;. This post shares what DART sees on the front lines, why "intermediaries" are the most critical link in your chain, and how to deploy PAM without rolling out a red carpet for threat actors.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;The foundation: A quick refresher on tiering&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; model&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; and PAM, PIM, and PAW concepts&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Before we dive into the&amp;nbsp;threat&amp;nbsp;actor’s&amp;nbsp;tactics&amp;nbsp;and techniques,&amp;nbsp;let’s&amp;nbsp;revisit the ground rules&amp;nbsp;and define a few key concepts. The Active Directory Tiering Model is built on a simple premise:&amp;nbsp;prevent&amp;nbsp;&lt;STRONG&gt;credential&amp;nbsp;theft propagation&lt;/STRONG&gt;; ensuring that credentials&amp;nbsp;with&amp;nbsp;administrative&amp;nbsp;access&amp;nbsp;to higher-tier systems are never exposed on lower-tier systems where a&amp;nbsp;threat actor&amp;nbsp;may already have a foothold.&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Tier 0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;is your control plane:&amp;nbsp;Domain Controllers, PKI,&amp;nbsp;and the identities that manage&amp;nbsp;your authentication plane.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Tier 1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;houses your application servers and data.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Tier 2&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;is the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;high-risk environment&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&amp;nbsp;user workstations and devices&amp;nbsp;exposed to the internet.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The golden&amp;nbsp;rule&amp;nbsp;of tiering is&amp;nbsp;strictly one-way:&amp;nbsp;higher tier admins must never expose their credentials to lower tier systems,&amp;nbsp;and lower tiers must never have management access to higher tiers.&amp;nbsp;The core purpose of this separation is to ensure that a compromised workstation cannot yield Domain Admin credentials. However, operational tools that bridge these tiers often inadvertently break this definitional boundary.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-gb/security/business/security-101/what-is-privileged-access-management-pam" target="_blank"&gt;&lt;STRONG&gt;PAM (Privileged Access Management):&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Solutions designed to securely vault credentials and broker administrative sessions, ensuring access to critical systems is&amp;nbsp;monitored&amp;nbsp;and controlled.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-privileged-identity-management-pim" target="_blank"&gt;&lt;STRONG&gt;PIM (Privileged Identity Management):&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Tools that manage the lifecycle of elevated roles, typically by enforcing time-bound, Just-In-Time (JIT) access to&amp;nbsp;eliminate&amp;nbsp;standing privileges.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-devices" target="_blank"&gt;&lt;STRONG&gt;PAW (Privileged Access Workstation):&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Highly hardened, dedicated devices used exclusively for sensitive administrative tasks, physically or logically isolating tier admins from high-risk activities like email and web browsing.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;&lt;SPAN data-contrast="none"&gt;Figure 1: Administration with dedicated tiered accounts&lt;/SPAN&gt;&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;The front-line reality: the shared intermediary trap&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Imagine this scenario: A threat actor compromises a standard workstation (Tier 2) through a phishing email. Their goal is the Domain Controller (Tier 0). In a properly tiered environment, this path is blocked; there are no credentials on the workstation to steal, and no direct privilege escalation route to the Domain Controller.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;But then the&amp;nbsp;threat actor&amp;nbsp;finds&amp;nbsp;an intermediary system.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In many environments, we see a single PAM session host used by&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;everyone&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. The Tier 1 admins use it to manage application servers, and the Tier 0 admins use it to manage Domain Controllers. This convergence creates a&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;"Shared" or "Dirty" Intermediary&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;SPAN data-ccp-props="{}"&gt;The attack path&lt;/SPAN&gt;&lt;/H5&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The foothold:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;The&amp;nbsp;threat actor&amp;nbsp;compromises a&amp;nbsp;standard&amp;nbsp;Tier 2 workstation.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;The escalation:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;The&amp;nbsp;threat actor&amp;nbsp;moves laterally and escalates privileges&amp;nbsp;by exploiting common lower-tier misconfigurations (such as Helpdesk scenarios or exposed&amp;nbsp;privileged&amp;nbsp;service accounts) to compromise a Tier 1 administrator account who has full control over the Tier 1 PAM Host.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The pivot:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Because the PAM Session Host&amp;nbsp;resides&amp;nbsp;in Tier 1, the&amp;nbsp;threat actor&amp;nbsp;uses those compromised Tier 1 admin rights to seamlessly gain full control of the underlying operating system of the PAM host itself.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The compromise:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;The&amp;nbsp;threat actor&amp;nbsp;simply waits for a Tier 0 admin to&amp;nbsp;initiate&amp;nbsp;a session. Because the&amp;nbsp;threat actor&amp;nbsp;already has full administrative control over the underlying server, it is a given that they can extract the Tier 0 credentials the moment that session begins.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Note:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;A threat actor at this stage does not need to exploit any weakness in the PAM software itself. Because the&amp;nbsp;session&amp;nbsp;host logically&amp;nbsp;resides&amp;nbsp;within the Tier 1 boundary, any identity or system with administrative rights over that tier holds ultimate authority over the host. This administrative control provides the means to&amp;nbsp;modify&amp;nbsp;the&amp;nbsp;host's&amp;nbsp;configuration, bypass security agents, and disable runtime protections before a privileged session ever begins. Once this foundational control is&amp;nbsp;established, credential material processed by the operating system for outbound privileged sessions becomes accessible. This is not a PAM product failure; it is an architectural placement failure&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Game over:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;The&amp;nbsp;threat actor&amp;nbsp;replays those credentials to take over the Domain Controller.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;Here is how that&amp;nbsp;compromise&amp;nbsp;looks architecturally:&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 2: Single PAM host architecture&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;The core concept: PAM is an intermediary&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To understand why the scenario above happens, we&amp;nbsp;have to&amp;nbsp;look at how Microsoft defines&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Privileged Access Intermediaries&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As detailed in our&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-intermediaries" target="_blank"&gt;Privileged access intermediaries guidance&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, an intermediary is any system that stands between a user and a target resource. This includes VPNs, Jump Servers, and PAM solutions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 class="lia-indent-padding-left-30px"&gt;&lt;SPAN class="lia-text-color-15"&gt;The Golden Rule of intermediaries&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN class="lia-text-color-15"&gt;&lt;EM&gt;The security assurance of the target is only as good as the security assurance of the intermediary.&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:720,&amp;quot;335559738&amp;quot;:100,&amp;quot;335572083&amp;quot;:12,&amp;quot;335572084&amp;quot;:12,&amp;quot;335572085&amp;quot;:11957550,&amp;quot;469789810&amp;quot;:&amp;quot;single&amp;quot;}"&gt;&lt;SPAN data-contrast="auto"&gt;If you manage a Tier 0 asset (like a Domain Controller) through a PAM server,&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;that PAM server becomes a Tier 0 asset&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;. &lt;/STRONG&gt;If that PAM server allows logins from Tier 1 users or is&amp;nbsp;reachable from Tier 2 workstations, you have effectively downgraded your Domain Controllers to the security level of a workstation.&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;You cannot have a "Tier 1" server managing "Tier 0" assets.&amp;nbsp;The math&amp;nbsp;simply&amp;nbsp;doesn't&amp;nbsp;work.&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;Each type of intermediary serves a different role, so the security controls won’t be identical.&amp;nbsp;However,&amp;nbsp;some basics apply to all of them,&amp;nbsp;like quickly patching appliances, firmware, operating systems, and applications.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Figure 3: Security impact of different PAM approaches&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;/img&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Third-party PIM/PAM&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;solutions &lt;/STRONG&gt;are often deployed on-premises or as a&amp;nbsp;Virtual Machine (VM)&amp;nbsp;in an&amp;nbsp;Infrastructure as a Service (IaaS)&amp;nbsp;environment&amp;nbsp;and are usually reachable only from internal (intranet) systems. Even if they&amp;nbsp;aren’t&amp;nbsp;exposed to the internet, one stolen credential could let a&amp;nbsp;threat&amp;nbsp;actor&amp;nbsp;reach them through VPN or other remote access methods.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-ccp-props="{}"&gt;The hidden risk: the "master key" service account&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The attack path above assumes&amp;nbsp;a&amp;nbsp;threat&amp;nbsp;actor&amp;nbsp;waits for a human administrator to arrive. But there is a second, more direct&amp;nbsp;risk&amp;nbsp;and it&amp;nbsp;doesn’t&amp;nbsp;require patience at all.&amp;nbsp;It’s&amp;nbsp;not just about where users log in;&amp;nbsp;it’s&amp;nbsp;about the power the software&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;holds&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Consider the Password Reset scenario. A key feature of PAM is automatically rotating Domain Admin passwords,&amp;nbsp;so human admins never need to know them;&amp;nbsp;credentials are simply injected into the session. However, to perform this action, the PAM Service Account&amp;nbsp;itself requires massive privileges (typically Domain Admin or equivalent) to reset those target passwords.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Here is the trap: If your PAM Core or Vault&amp;nbsp;resides&amp;nbsp;in Tier 1 (or is treated as such) but manages Tier 0 credentials, you have effectively granted Domain Admin rights to a Tier 1 asset.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A&amp;nbsp;threat actor&amp;nbsp;doesn't&amp;nbsp;even need to wait for a human administrator to log in. If they compromise the underlying server where the PAM service runs, they can extract the Service Account’s credentials. Since this account has the power to reset Domain Admin passwords, the&amp;nbsp;threat actor&amp;nbsp;instantly elevates to Tier 0;&amp;nbsp;no session&amp;nbsp;required, no waiting, no noise&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN class="lia-text-color-15"&gt;&lt;STRONG&gt;This reinforces the golden rule:&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;If a Service Account manages Tier 0, the system it&amp;nbsp;runs on&amp;nbsp;is Tier 0.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;The two attack vectors:&amp;nbsp;hijacking a session and stealing the service account.&amp;nbsp;Both stem from the same root cause: architectural misplacement. Fix the placement, and you&amp;nbsp;eliminate&amp;nbsp;both.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:720,&amp;quot;335559738&amp;quot;:100,&amp;quot;335572083&amp;quot;:12,&amp;quot;335572084&amp;quot;:12,&amp;quot;335572085&amp;quot;:11957550,&amp;quot;469789810&amp;quot;:&amp;quot;single&amp;quot;}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:720,&amp;quot;335559738&amp;quot;:100,&amp;quot;335572083&amp;quot;:12,&amp;quot;335572084&amp;quot;:12,&amp;quot;335572085&amp;quot;:11957550,&amp;quot;469789810&amp;quot;:&amp;quot;single&amp;quot;}"&gt;Practical checklist: are you exposed?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In&amp;nbsp;DART&amp;nbsp;engagements, we use this checklist to rapidly assess if a PAM deployment is a security asset or a liability.&amp;nbsp;Use this to&amp;nbsp;validate&amp;nbsp;your own environment:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The intermediary check:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Does any server used to manage Domain Controllers allow inbound RDP, SMB&amp;nbsp;or other management connections from standard workstations or Tier 1 servers?&amp;nbsp;(If yes, you are bridged).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The identity check:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Do you use the same "Admin" account to log into the PAM portal for both Tier 0 and Tier 1 tasks? (If yes, you are exposing&amp;nbsp;credentials).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The reachability check:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Can your PAM Vault/Core be reached from the general user network? (It should only be reachable from management zones).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The isolation check:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Are your Tier 0 Session Hosts logically and technically treated as Tier 0 assets?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;What good looks like: The tiered PAM architecture&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;How do we fix this? We&amp;nbsp;don't&amp;nbsp;throw away PAM; we align it with the&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-intermediaries" target="_blank"&gt;Enterprise Access Model&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In DART, we advocate for a &lt;STRONG&gt;t&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;iered PAM deployment&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;.&lt;/STRONG&gt; This&amp;nbsp;doesn't&amp;nbsp;necessarily mean buying three different PAM vaults. It means strictly segregating the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;session&amp;nbsp;hosts&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;control plane&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;SPAN data-ccp-props="{}"&gt;The architecture of isolation&lt;/SPAN&gt;&lt;/H5&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Tier 0 Control Plane:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;The core of your PAM (the Vault, the Policy Manager) holds the keys to the kingdom. Therefore, it must be treated as Tier 0. It should only be manageable by Tier 0 admins from Tier 0 workstations.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Segregated Session Hosts:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;You must have separate&amp;nbsp;session host&amp;nbsp;infrastructure for each tier.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Tier 1 Session Host:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Accessible from Tier 1, manages Tier 1.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Blocked&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;from talking to Domain&amp;nbsp;Controllers.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Tier 0 Session Host:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Accessible&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;only&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;from Tier 0 PAWs, manages Tier 0.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Totally isolated&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;from the rest of the network.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This diagram illustrates a PAM deployment that respects the tiering model:&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Figure 4: Separate PAM host architecture&lt;/SPAN&gt;&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;F&lt;SPAN data-contrast="auto"&gt;or a deeper dive into reconciling these paradigms,&amp;nbsp;review&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-intermediaries" target="_blank"&gt;Intermediaries in Securing Privileged Administration&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and Microsoft's guide on&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/microsoft-identity-manager/pam/tier-model-for-partitioning-administrative-privileges" target="_blank"&gt;Partitioning Administrative Privileges&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:320,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:320,&amp;quot;335559740&amp;quot;:240}"&gt;FAQ: Clearing the confusion&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Q: Does PAM always belong&amp;nbsp;in&amp;nbsp;Tier 0?&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;A:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;If the PAM system manages Tier 0 credentials or provides access to Tier 0 assets,&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;yes&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;. &lt;/STRONG&gt;The components that touch Tier 0 (Vault, Brokers, Session Hosts) must be secured at Tier 0 standards.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Q: Can we use a single "hardened"&amp;nbsp;session host&amp;nbsp;for all tiers to save costs?&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;A:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;In DART's experience,&amp;nbsp;no. "Hardening" is often a configuration state that drifts or is bypassed by zero-days.&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Architecture beats configuration.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;If you bridge the network tiers, a compromised Tier 1 admin account is all a&amp;nbsp;threat actor&amp;nbsp;needs to gain OS-level control of that host and from there, access to Tier 0 sessions is a matter of patience, not sophistication.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Q: If we have PAM, do we still need the Tiering Model?&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;A:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Absolutely.&amp;nbsp;PAM&amp;nbsp;doesn’t&amp;nbsp;replace Tiering; when implemented correctly, it adds another layer of security and/or&amp;nbsp;governance.&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Tiering&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;keeps credentials and admin access separated,&amp;nbsp;so&amp;nbsp;threat actors&amp;nbsp;can’t&amp;nbsp;easily move sideways or reuse stolen hashes.&amp;nbsp;PAM provides&amp;nbsp;workflow, rotation, and audit trails.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Q: What is the most common mistake you see?&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;A:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;We&amp;nbsp;frequently&amp;nbsp;see organizations approach PAM as a "magic stick", believing it secures everything about credential hygiene.&amp;nbsp;Yet, because they assume the tool secures itself, they treat this critical infrastructure as just another Tier-1 asset. It gets patched like a standard file server and&amp;nbsp;monitored&amp;nbsp;like a print server, rather than being hardened and isolated as a Tier-0&amp;nbsp;component. This mindset&amp;nbsp;doesn't&amp;nbsp;secure the environment; it creates a fragile bridge that&amp;nbsp;threat&amp;nbsp;actors can easily cross.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Q: Our PAM vendor says their session host is hardened out of the box. Why is this still a risk?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;A:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;PAM vendors are right that a well-configured session host with Credential&amp;nbsp;Guard&amp;nbsp;enabled, application control enforced, and remote management restricted&amp;nbsp;is&amp;nbsp;considerably harder&amp;nbsp;to exploit than a&amp;nbsp;stock&amp;nbsp;Windows Server. Some vendors use Kerberos constrained delegation with S4U2Proxy, meaning the machine account rather than the Domain Admin’s actual credentials&amp;nbsp;authenticates&amp;nbsp;to the target, which limits direct credential exposure. These are meaningful controls and we&amp;nbsp;don’t&amp;nbsp;dismiss them. However,&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;application-layer hardening is defeated by OS-layer control&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;. &lt;/STRONG&gt;If the PAM host is domain-joined and sits in a Tier 1 OU, a Tier 1 Domain Admin has Group Policy, software deployment rights, and&amp;nbsp;Active Directory&amp;nbsp;machine account control over that host. They can push a GPO to disable Credential Guard, deploy a driver via software distribution, or alter the&amp;nbsp;machine’s&amp;nbsp;configuration before the next reboot,&amp;nbsp;all using entirely legitimate AD administration tools.&amp;nbsp;The vendor’s hardening is irrelevant once the&amp;nbsp;threat actor&amp;nbsp;controls the tier the machine lives in. This is precisely why&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;tier placement is not a PAM configuration decision; it is an Active Directory architecture decision.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Q:&amp;nbsp;We’re&amp;nbsp;cloud-first and use Entra ID. Does AD Tiering still apply to us?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;A:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;The specific tier labels change, but the principle does not. Microsoft’s&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-access-model" target="_blank"&gt;Enterprise Access Model&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;is the cloud-era evolution of AD Tiering, built around the same core concept: Control Plane (equivalent to Tier 0), Management Plane (Tier 1), and User Access / Data Plane (Tier 2). In an Entra ID environment, your Control Plane includes Global Administrators, Privileged Role Administrators, and the Conditional Access policies that govern them. A PAM or PIM&amp;nbsp;solution&amp;nbsp;managing those identities must be treated with the same isolation discipline. Hybrid environments,&amp;nbsp;where on-premises AD and Entra ID are synchronized,&amp;nbsp;carry the&amp;nbsp;additional&amp;nbsp;risk that a compromise of either plane can propagate to the other through synchronization. If anything, hybrid environments make strict intermediary placement&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;more&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; critical, not less.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-ccp-props="{}"&gt;Conclusion&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;PAM is a powerful tool in the defender’s arsenal;&amp;nbsp;but like any powerful tool, its effectiveness depends entirely on how it is positioned.&amp;nbsp;The&amp;nbsp;threat actors&amp;nbsp;we&amp;nbsp;encounter&amp;nbsp;in DART&amp;nbsp;engagements&amp;nbsp;don’t look for the most sophisticated path to Domain Admin. They look for the most&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;trusted&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;one.&amp;nbsp;A PAM server in the wrong tier&amp;nbsp;isn’t&amp;nbsp;a hardened barrier;&amp;nbsp;it’s&amp;nbsp;a trusted bridge with a gold-plated sign.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By aligning your PAM deployment with the principles of&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/overview" target="_blank"&gt;Privileged Access Administration&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;treating session hosts and service accounts as the tier of the assets they manage, not the zone they physically sit in,&amp;nbsp;you close the bridge before a&amp;nbsp;threat actor&amp;nbsp;finds it.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Build your architecture like a&amp;nbsp;threat actor&amp;nbsp;will find it. Because they will.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Stay secure, stay&amp;nbsp;tiered.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:200,&amp;quot;335572079&amp;quot;:6,&amp;quot;335572080&amp;quot;:1,&amp;quot;335572081&amp;quot;:11957550,&amp;quot;469789806&amp;quot;:&amp;quot;single&amp;quot;}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 18:34:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/when-the-shield-becomes-the-sword-how-misconfigured-pam-bridges/ba-p/4509392</guid>
      <dc:creator>UgurTGudekli</dc:creator>
      <dc:date>2026-04-15T18:34:46Z</dc:date>
    </item>
    <item>
      <title>Hunting Infostealers - Trusted Platform Abuse</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/hunting-infostealers-trusted-platform-abuse/ba-p/4505343</link>
      <description>&lt;P&gt;In this part of the “Hunting Infostealers” series, we explore the growing abuse of trusted communication services and software ecosystems—including messaging platforms like WhatsApp and seemingly benign PDF converter tools—to propagate malware and deploy credential stealers such as Eternidade Stealer, lowering user suspicion and complicating detection. Throughout the blog, we map observed activity to Microsoft Defender XDR coverage and provide actionable guidance to help organizations detect, mitigate, and respond to infostealers.&lt;/P&gt;
&lt;P&gt;Platform Abuse (WhatsApp, PDF Converters)&lt;BR /&gt;Since late 2025, Platform abuse has become an increasingly prevalent tactic in the modern threat landscape, wherein adversaries deliberately exploit the legitimacy, scale, and user trust associated with widely used applications and services. By weaponizing platforms such as WhatsApp and seemingly benign PDF conversion tools, threat actors are able to disguise malicious activity within normal user behavior, enabling efficient malware delivery, lateral propagation, and evasion of traditional security controls.&lt;/P&gt;
&lt;H3&gt;WhatsApp Abused to Deliver Eternidade Stealer&lt;/H3&gt;
&lt;P&gt;During the third week of November 2025, Microsoft Defender Experts (DEX) identified a WhatsApp platform abuse campaign that leverages a multi-stage infection chain and worm-like propagation techniques to distribute malware. The activity begins with the execution of an obfuscated Visual Basic script, which drops a malicious batch file that launches multiple PowerShell instances to download additional payloads from adversary-controlled command-and-control domains. These payloads include a Python script responsible for WhatsApp Web–based dissemination of the malware in a worm-like manner, as well as a malicious MSI installer that ultimately delivers the Eternidade Stealer. To ensure successful execution, the batch script also installs the required Python dependencies on the compromised system.&lt;/P&gt;
&lt;P&gt;The Python script establishes communication with a remote server and leverages the open-source project WPPConnect to automate message sending from hijacked WhatsApp accounts. As part of this process, it harvests the victim’s entire contact list while filtering out groups, business contacts, and broadcast lists. The malware then collects, for each contact, the associated WhatsApp phone number, name, and an indicator showing whether the contact is saved. This information is exfiltrated to an attacker-controlled server via an HTTP POST request. In the final stage of this propagation mechanism, the malware sends a malicious attachment to all harvested contacts, using a predefined messaging template populated with time-based greetings and contact names to increase the likelihood of interaction.&lt;/P&gt;
&lt;P&gt;The malicious MSI installer drops several components, including encrypted payload files with .dmp and .tda extensions, an &lt;STRONG&gt;AutoIt executable&lt;/STRONG&gt;, and a script loader disguised as a &lt;STRONG&gt;.log&lt;/STRONG&gt; file. Despite its benign appearance, the .log file functions as an AutoIt-based malicious script that conducts environment reconnaissance, performs anti-detection checks, and loads payloads in memory using large hex-encoded binary blobs to initialize native components. The encrypted .tda file acts as an injector and employs a process hollowing technique to execute the final payload. Specifically, the injector reads the .dmp file, decrypts the embedded payload, and injects the Eternidade Stealer into svchost.exe, allowing the malware to run stealthily under the guise of a trusted system process.&lt;/P&gt;
&lt;P&gt;Eternidade Stealer, a Delphi-based credential stealer, continuously monitors active windows and running processes for strings associated with banking portals, payment services, and cryptocurrency exchanges and wallets. These include, but are not limited to, Bradesco, BTG Pactual, MercadoPago, Stripe, Binance, Coinbase, MetaMask, and Trust Wallet, highlighting its focus on harvesting sensitive financial and cryptocurrency-related information&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;WhatsApp Abuse to Deliver Eternidade Stealer Attack Chain&lt;/EM&gt;&lt;/img&gt;
&lt;H3&gt;Malicious Crystal PDF installer campaign&lt;/H3&gt;
&lt;P&gt;In late September 2025, Microsoft Defender Experts (DEX) discovered a malicious campaign conducted by an unknown threat actor centered on an application masquerading as a PDF editor named Crystal PDF. The campaign leveraged malvertising and search engine optimization (SEO) poisoning techniques, using misleading advertisements to lure users into downloading a malicious payload.&lt;/P&gt;
&lt;P&gt;The attack chain begins when a user clicks the download button for the PDF editor on &lt;STRONG&gt;crystalpdf[.]com&lt;/STRONG&gt;. The request is redirected to one of two actor-controlled domains, from which the CrystalPDF.exe payload is downloaded. Users most likely arrived at this website through deceptive advertisements distributed via Google Ads, which served as the primary lure for the campaign. Microsoft suspects that Google Ads were used based on the URL format observed in telemetry: &lt;STRONG&gt;hxxps://smartdwn[.]com/download?v=&amp;lt;GUID&amp;gt;&amp;amp;campaign_id=&amp;lt;ID#&amp;gt;&amp;amp;utm_source=google_b2b&amp;amp;subid=&amp;lt;domainSource&amp;gt;&amp;amp;kw=true&amp;amp;gad_source=5&amp;amp;gad_campaignid=&amp;lt;ID#&amp;gt;&amp;amp;gclid=&amp;lt;&amp;gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When CrystalPDF.exe is downloaded and executed on the device, it performs several actions to establish persistence and enable further activity. A copy of the CrystalPDF.exe payload is created in the &lt;STRONG&gt;AppData\Local\Temp\crys &lt;/STRONG&gt;directory, and a malicious scheduled task is created to ensure continued execution on the compromised device. In addition, a second binary named Crystal PDF.exe (note the space in the filename) is dropped in the user’s Desktop folder.&lt;/P&gt;
&lt;P&gt;The attacker configures the payload to run daily at 7:15 AM local system time using a scheduled task named Crystal_updater. When triggered, this scheduled task launches the malicious &lt;STRONG&gt;CrystalPDF.exe&lt;/STRONG&gt;, which initiates network connections to three command-and-control domains: &lt;STRONG&gt;negmari[.]com&lt;/STRONG&gt;,&lt;STRONG&gt; ramiort[.]com&lt;/STRONG&gt;, and &lt;STRONG&gt;strongdwn[.]com&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The secondary executable, Crystal PDF.exe, stored in the Desktop directory, establishes network connections to multiple cloudconvert[.]com-related domains. CloudConvert is a legitimate service used to convert files into different formats, including converting various document types into PDF files. Analysis of this file indicates that it is a clean file and is designed to appear as a legitimate application that leverages CloudConvert to provide document-to-PDF conversion functionality.&lt;/P&gt;
&lt;P&gt;Despite presenting itself as a legitimate PDF conversion and merging tool, CrystalPDF.exe ultimately functions as an information stealer. It covertly hijacks Firefox and Chrome browsers and attempts to access sensitive files located in the AppData\Roaming directory, which stores user-specific configuration and profile data that must persist across sessions. This includes cookies and session data, sign-in and credential caches, and profile settings. By harvesting credentials, tokens, and session cookies stored in the browser, the attacker can bypass standard authentication mechanisms and impersonate the user to gain unauthorized access to accounts and services that the user is authorized to use.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Crystal PDF Installer Attack Chain&lt;/EM&gt;&lt;/img&gt;
&lt;H2&gt;Mitigation and protection guidance&lt;/H2&gt;
&lt;P&gt;Microsoft recommends the following mitigations to reduce the impact of trusted platform abuse used to deliver infostealers as discussed in this report. These recommendations draw from established Defender blog guidance patterns and align with protections offered across Microsoft Defender XDR.&lt;/P&gt;
&lt;P&gt;Organizations can follow these recommendations to mitigate threats associated with this threat: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Strengthen user awareness &amp;amp; execution safeguards&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Educate users on social‑engineering lures&lt;/STRONG&gt;, including malvertising redirect chains, fake installers, and ClickFix‑style copy‑paste prompts.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Control outbound traffic &amp;amp; staging behavior&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Block direct access to known C2 infrastructure&lt;/STRONG&gt; where possible, informed by your organization’s threat‑intelligence sources.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Protect against cross‑platform payloads&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Harden endpoint defenses around LOLBIN abuse&lt;/STRONG&gt;, such as wscript.exe executing Visual Basic scripts.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Evaluate activity involving AutoIt and process hollowing&lt;/STRONG&gt;, common in platform‑abuse campaigns.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Microsoft also recommends the following mitigations to reduce the impact of this threat.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Turn on&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus" target="_blank" rel="noopener"&gt;cloud-delivered protection&lt;/A&gt; in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving attacker tools and techniques. Cloud-based machine learning protections block a majority of new and unknown threats.&lt;/LI&gt;
&lt;LI&gt;Run&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-endpoint/edr-in-block-mode" target="_blank" rel="noopener"&gt;EDR in block mode&lt;/A&gt; so that Microsoft Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus does not detect the threat or when Microsoft Defender Antivirus is running in passive mode. EDR in block mode works behind the scenes to remediate malicious artifacts that are detected post-breach.&lt;/LI&gt;
&lt;LI&gt;Enable network protection and web protection in Microsoft Defender for Endpoint to safeguard against malicious sites and internet-based threats.&lt;/LI&gt;
&lt;LI&gt;Encourage users to use Microsoft Edge and other web browsers that support Microsoft Defender SmartScreen, which identifies and blocks malicious websites, including phishing sites, scam sites, and sites that host malware.&lt;/LI&gt;
&lt;LI&gt;Allow&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-endpoint/automated-investigations" target="_blank" rel="noopener"&gt;investigation and remediation&lt;/A&gt; in full automated mode to allow Microsoft Defender for Endpoint to take immediate action on alerts to resolve breaches, significantly reducing alert volume.&lt;/LI&gt;
&lt;LI&gt;Turn on&amp;nbsp;&lt;A href="https://learn.microsoft.com/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection" target="_blank" rel="noopener"&gt;tamper protection features&lt;/A&gt; to prevent attackers from stopping security services. Combine tamper protection with the &lt;A href="https://learn.microsoft.com/windows/client-management/mdm/defender-csp" target="_blank" rel="noopener"&gt;DisableLocalAdminMerge&lt;/A&gt;&amp;nbsp;setting to prevent attackers from using local administrator privileges to set antivirus exclusions.&lt;/LI&gt;
&lt;LI&gt;Microsoft Defender XDR customers can also implement the following attack surface reduction rules to harden an environment against LOLBAS techniques used by threat actors:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/attack-surface-reduction-rules-reference#block-execution-of-potentially-obfuscated-scripts" target="_blank" rel="noopener"&gt;Block execution of potentially obfuscated scripts&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;A href="https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion" target="_blank" rel="noopener"&gt;Block executable files from running unless they meet a prevalence, age, or trusted list criterion&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;A href="https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content" target="_blank" rel="noopener"&gt;Block JavaScript or VBScript from launching downloaded executable content&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Microsoft Defender XDR detections&amp;nbsp; &amp;nbsp;&lt;/H1&gt;
&lt;P&gt;Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, and apps to provide integrated protection against attacks like the threat discussed in this blog.&lt;/P&gt;
&lt;P&gt;Customers with provisioned access can also use &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/security-copilot-in-microsoft-365-defender" target="_blank" rel="noopener"&gt;Microsoft Security Copilot in Microsoft Defender&lt;/A&gt; to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Tactic&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Observed activity&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender coverage&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Execution&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Payloads downloaded using PowerShell&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Suspicious Powershell download or encoded command execution&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Persistence&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Registry Run key created&lt;/P&gt;
&lt;P&gt;- Scheduled task created for recurring execution&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Anomaly detected in ASEP registry&lt;/P&gt;
&lt;P&gt;- Suspicious Scheduled Task Launched&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Defense Evasion&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Unauthorized code execution facilitated by DLL sideloading and process injection&lt;/P&gt;
&lt;P&gt;- Python script execution&lt;/P&gt;
&lt;P&gt;- Renamed AutoIT interpreter binary and AutoIT script&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- An executable file loaded an unexpected DLL file&lt;/P&gt;
&lt;P&gt;- A process was injected with potentially malicious code&lt;/P&gt;
&lt;P&gt;- Suspicious Python binary execution&lt;/P&gt;
&lt;P&gt;- Rename AutoIT tool&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Discovery&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- System information queried using WMI and Python&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Suspicious System Hardware Discovery&lt;/P&gt;
&lt;P&gt;- Suspicious Process Discovery&lt;/P&gt;
&lt;P&gt;- Suspicious Security Software Discovery&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Threat intelligence reports&lt;/H3&gt;
&lt;P&gt;Microsoft customers can use the following reports in Microsoft products to get the most up-to-date information about the threat actor, malicious activity, and techniques discussed in this blog. These reports provide the intelligence, protection information, and recommended actions to prevent, mitigate, or respond to associated threats found in customer environments.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender XDR Threat analytics&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://security.microsoft.com/intel-explorer/articles/398d9691" target="_blank" rel="noopener"&gt;Malicious Crystal PDF installer campaign&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Hunting queries&amp;nbsp;&lt;/H1&gt;
&lt;H2&gt;Microsoft Defender XDR&lt;/H2&gt;
&lt;P&gt;Microsoft Defender XDR customers can run the following queries to find related activity in their networks:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Use the following queries to identify activity related to WhatsApp Abused to Deliver Eternidade Stealer&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify the files dropped from the malicious VBS execution
DeviceFileEvents
| where InitiatingProcessCommandLine has_all ("Downloads",".vbs")
| where FileName has_any (".zip",".lnk",".bat") and FolderPath has_all ("\\Temp\\")&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify batch script launching powershell instances to drop payloads
DeviceProcessEvents
| where InitiatingProcessParentFileName == "wscript.exe" and InitiatingProcessCommandLine  has_any ("instalar.bat","python_install.bat")
| where ProcessCommandLine !has "conhost.exe"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify AutoIT executable invoking malicious AutoIT script
DeviceProcessEvents
| where InitiatingProcessCommandLine   has ".log" and InitiatingProcessVersionInfoOriginalFileName == "Autoit3.exe"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Use the following queries to identify activity related to Malicious &lt;/STRONG&gt;&lt;STRONG&gt;CrystalPDF Installer Campaign&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify network connections to C2 domains
DeviceNetworkEvents
| where InitiatingProcessVersionInfoOriginalFileName == "CrystalPDF.exe"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify scheduled task persistence
DeviceEvents
| where InitiatingProcessVersionInfoProductName == "CrystalPDF"
| where ActionType == "ScheduledTaskCreated&lt;/LI-CODE&gt;
&lt;H1&gt;Indicators of compromise&lt;/H1&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Indicator&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Type&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Description&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;2c885d1709e2ebfcaa81e998d199b29e982a7559b9d72e5db0e70bf31b183a5f  &lt;/P&gt;
&lt;P&gt;6168d63fad22a4e5e45547ca6116ef68bb5173e17e25fd1714f7cc1e4f7b41e1&lt;/P&gt;
&lt;P&gt;3bd6a6b24b41ba7f58938e6eb48345119bbaf38cd89123906869fab179f27433&amp;nbsp;&lt;/P&gt;
&lt;P&gt;5d929876190a0bab69aea3f87988b9d73713960969b193386ff50c1b5ffeadd6&amp;nbsp;&lt;/P&gt;
&lt;P&gt;bdd2b7236a110b04c288380ad56e8d7909411da93eed2921301206de0cb0dda1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;495697717be4a80c9db9fe2dbb40c57d4811ffe5ebceb9375666066b3dda73c3&amp;nbsp;&lt;/P&gt;
&lt;P&gt;de07516f39845fb91d9b4f78abeb32933f39282540f8920fe6508057eedcbbea&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;SHA-256&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Payloads related to WhatsApp malware campaign&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;598da788600747cf3fa1f25cb4fa1e029eca1442316709c137690e645a0872bb&lt;/P&gt;
&lt;P&gt;3bc62aca7b4f778dabb9ff7a90fdb43a4fdd4e0deec7917df58a18eb036fac6e&lt;/P&gt;
&lt;P&gt;c72f8207ce7aebf78c5b672b65aebc6e1b09d00a85100738aabb03d95d0e6a95&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;SHA-256&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Payloads related to Malicious Crystal PDF installer campaign&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;hxxps://empautlipa[.]com/altor/installer.msi&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;URL&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Used to deliver VBS initial access payload (WhatsApp Abused to Deliver Eternidade Stealer)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Negmari[.]com&lt;/P&gt;
&lt;P&gt;Ramiort[.]com&lt;/P&gt;
&lt;P&gt;Strongdwn[.]com&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td colspan="2"&gt;
&lt;P&gt;C2 servers (Malicious Crystal PDF installer campaign)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H1&gt;Microsoft Sentinel&lt;/H1&gt;
&lt;P&gt;Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with ‘TI map’) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the &lt;A href="https://learn.microsoft.com/azure/sentinel/sentinel-solutions-deploy" target="_blank" rel="noopener"&gt;Microsoft Sentinel Content Hub&lt;/A&gt; to have the analytics rule deployed in their Sentinel workspace.&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;References&lt;/H1&gt;
&lt;P&gt;&lt;A href="https://www.cyberproof.com/blog/infostealers-stike-again-malicious-installers-impersonate-legitimate-productivity-tools/" target="_blank" rel="noopener"&gt;Infostealers Strike Again: Malicious Installers Pass Through EDRs Undetected&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://levelblue.com/blogs/spiderlabs-blog/spiderlabs-ids-new-banking-trojan-distributed-through-whatsapp/" target="_blank" rel="noopener"&gt;SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Learn more &amp;nbsp;&lt;/H1&gt;
&lt;P&gt;For the latest security research from the Microsoft Threat Intelligence community, check out the &lt;A href="https://aka.ms/threatintelblog" target="_blank" rel="noopener"&gt;Microsoft Threat Intelligence Blog&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;To get notified about new publications and to join discussions on social media, follow us on &lt;A href="https://www.linkedin.com/showcase/microsoft-threat-intelligence" target="_blank" rel="noopener"&gt;LinkedIn&lt;/A&gt;, &lt;A href="https://x.com/MsftSecIntel" target="_blank" rel="noopener"&gt;X (formerly Twitter)&lt;/A&gt;, and &lt;A href="https://bsky.app/profile/threatintel.microsoft.com" target="_blank" rel="noopener"&gt;Bluesky&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the &lt;A href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence" target="_blank" rel="noopener"&gt;Microsoft Threat Intelligence podcast&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/hunting-infostealers-trusted-platform-abuse/ba-p/4505343</guid>
      <dc:creator>FeliciaCarter</dc:creator>
      <dc:date>2026-04-15T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Hunting Infostealers - Python Stealers</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/hunting-infostealers-python-stealers/ba-p/4505342</link>
      <description>&lt;P&gt;In this next part of the “Hunting Infostealers” series, we’ll cover Python information stealers. The proliferation of Python stealers over the past year has become an escalating concern in the cybersecurity landscape. This gravitation towards Python is largely driven by the ease of use of the language and the availability of tools and frameworks which allow for quick development, even for individuals with limited knowledge of coding. Typically, Python infostealers are distributed via phishing emails to infiltrate systems. The sensitive information they collect includes, but is not limited to login credentials, session cookies, authentication tokens, credit card numbers, and crypto wallet data. To evade detection, threat actors utilize legitimate services such as Telegram for command-and-control communications, obfuscate their code, and use signed and living off the land binaries. Due to the growing threat of Python-based infostealers, it is important that organizations protect their environment by being aware of the tactics, techniques, and procedures used by the threat actors who deploy this type of malware.&lt;/P&gt;
&lt;P&gt;One of the most notable Python-based infostealers seen in 2025 was PXA Stealer. It harvests sensitive data from infected systems such as login credentials, financial information, and browser data. It is linked to Vietnamese-speaking threat actors who target government and education entities. It is primarily delivered via phishing campaigns that use social engineering to trick users into downloading malicious files onto their computer. Throughout the blog, we map observed activity to Microsoft Defender XDR coverage and provide actionable guidance to help organizations detect, mitigate, and respond to infostealers operating without borders.&lt;/P&gt;
&lt;H3&gt;PXA Stealer: Campaign 1&lt;/H3&gt;
&lt;P&gt;In October 2025, Microsoft Defender Experts (DEX) identified a campaign involving PXA Stealer. The attack begins with a phishing email with a malicious URL. Some of the observed URLs contained in the emails were &lt;STRONG&gt;hxxp://concursal[.]macquet[.]de/uid_page=244739642061129&lt;/STRONG&gt; and &lt;STRONG&gt;hxxps://tickets[.]pfoten-prinz[.]de/uid_page=118759991475831.&lt;/STRONG&gt; The URLs have the same format, but with different domain names and values for the uid_page key. When the user clicks the URL, they are taken to a blank web page that contains JavaScript to download a ZIP file from a remote location, such as &lt;STRONG&gt;allecos[.]de&lt;/STRONG&gt;, once the page is fully loaded. The files contained in the ZIP file that are used to execute the next payload include an executable (renamed WinWord.exe) masquerading as a Word document with the same name as the ZIP file, a malicious DLL named &lt;STRONG&gt;msvcr100.dll&lt;/STRONG&gt;, and several files used in a series of commands concatenated with “&amp;amp;&amp;amp;” that ultimately execute an obfuscated Python script that loads PXA Stealer and PureRAT. When the renamed WinWord.exe file is executed, &lt;STRONG&gt;msvcr100.dll &lt;/STRONG&gt;is sideloaded which leads to the execution of the concatenated command line via cmd.exe. The command line does the following: opens a benign decoy Word document to delay the users’ suspicion and sandbox analysis, uses certutil.exe to decode a base64-encoded blob hidden in &lt;STRONG&gt;DA &lt;/STRONG&gt;&lt;STRONG&gt;성형외과&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;재무&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;보고서&lt;/STRONG&gt;&lt;STRONG&gt;.pdf&lt;/STRONG&gt; which results in a ZIP file named &lt;STRONG&gt;Invoice.pdf&lt;/STRONG&gt; (contains Python environment, renamed Python interpreter named &lt;STRONG&gt;svchost.exe&lt;/STRONG&gt;, and an obfuscated Python script named &lt;STRONG&gt;images.png&lt;/STRONG&gt;), uses another file named &lt;STRONG&gt;images.png&lt;/STRONG&gt; (renamed WinRAR.exe) to extract the contents of &lt;STRONG&gt;Invoice.pdf&lt;/STRONG&gt;, deletes &lt;STRONG&gt;Invoices.pdf&lt;/STRONG&gt; and the renamed WinRAR file, then uses &lt;STRONG&gt;svchost.exe&lt;/STRONG&gt; (renamed pythonw.exe) to execute &lt;STRONG&gt;images.png&lt;/STRONG&gt; with a Telegram bot identifier that’s used to fetch and execute the next payload. When &lt;STRONG&gt;images.png&lt;/STRONG&gt; is executed, it creates a Registry Run key named &lt;STRONG&gt;Windows Update Service&lt;/STRONG&gt; to re-execute itself when the user logs in. The script downloads PXA Stealer from &lt;STRONG&gt;urlvanish[.]com&lt;/STRONG&gt; (URL shortener), which redirects to &lt;STRONG&gt;bagumedios[.]cloud&lt;/STRONG&gt;,&lt;STRONG&gt; &lt;/STRONG&gt;then executes the infostealer in its memory space.&lt;/P&gt;
&lt;P&gt;Before collecting information, the stealer downloads a DLL from Dropbox. The DLL is injected into a Chrome process to bypass Chrome’s App-Bound Encryption (ABE) so sensitive browser information can be stolen. After that, it collects the installed AV products and browser information such as login credentials, cookies, autofill data, and credit card information. That information is archived into a ZIP file with a file name that follows the format "[CountryCode_IPAddress] ComputerName.zip", then it’s exfiltrated using Telegram.&lt;/P&gt;
&lt;P&gt;Once the exfiltration is complete, &lt;STRONG&gt;images.png&lt;/STRONG&gt; downloads another payload from &lt;STRONG&gt;hxxps://bagumedios[.]cloud/assets/media/others/ADN/pure&lt;/STRONG&gt; and injects it into &lt;STRONG&gt;cvtres.exe&lt;/STRONG&gt;. The payload is a commercially available remote access trojan named PureRAT which proceeds to connect to its command-and-control (C2) server &lt;STRONG&gt;157.66.27[.]11&lt;/STRONG&gt; (located in Vietnam) over port 56001 after injection. After that, &lt;STRONG&gt;cvtres.exe&lt;/STRONG&gt; uses WMI to collect installed AV products, connected cameras, and the Windows OS version. It sends the collected information to its C2 server.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;PXA Stealer (Campaign 1) Attack Chain&lt;/EM&gt;&lt;/img&gt;
&lt;H3&gt;PXA Stealer: Campaign 2&lt;/H3&gt;
&lt;P&gt;In late December 2025, DEX identified another PXA Stealer campaign. This attack also begins with a phishing email that delivers a ZIP archive that masquerades as a PDF, image, or Word document.&amp;nbsp; Some similar TTPs were noted for the second campaign where the use of Living Off-the Land Binaries (LOLBINs) was invoked, such as certutil.exe. The Certutil application is a native Windows application that allows for displaying Certification Authority (CA) configuration information, configure Certificate Services, and backup and restore CA components. The program also verifies certificates, key pairs, and certificate chains.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The capability used in Campaign 2 used the decode parameter in Certutil on an encoded PDF. The decoded PDF was then presented to an application with a file extension of “.png”.&amp;nbsp; Further investigation of this application identified command line behavior typical to that of a WinRAR, with a password protected ZIP archive.&amp;nbsp; This obfuscation allowed the application to continue to perform un-archiving steps, ultimately leading to python modules being loaded on the device. Once the Python modules were available, additional activity such as scheduled tasks were created paving the way for update scripts to be deployed on affected hosts. Communication to C2 infrastructure was then initiated through the svchost (Python interpreter) process to connect and transmit data to the attacker via &lt;STRONG&gt;hxxp://195.24.236[.]116/recover/getlink?id=sunset &lt;/STRONG&gt;and &lt;STRONG&gt;hxxp://195.24.236[.]116/recover/links/sunset.txt&lt;/STRONG&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;PXA Stealer (Campaign 2) Attack Chain&lt;/EM&gt;&lt;/img&gt;
&lt;H2&gt;Mitigation and protection guidance&lt;/H2&gt;
&lt;P&gt;Microsoft recommends the following mitigations to reduce the impact of the Python‑based infostealers discussed in this report. These recommendations draw from established Defender blog guidance patterns and align with protections offered across Microsoft Defender XDR.&lt;/P&gt;
&lt;P&gt;Organizations can follow these recommendations to mitigate threats associated with this threat: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Strengthen user awareness &amp;amp; execution safeguards&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Educate users on social‑engineering lures&lt;/STRONG&gt;, such as phishing emails.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Control outbound traffic &amp;amp; staging behavior&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Inspect network egress for POST requests to newly registered or suspicious domains&lt;/STRONG&gt;—a key indicator for Python‑based stealer campaigns.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Detect transient creation of ZIP archives under ephemeral directories&lt;/STRONG&gt;, followed by outbound exfiltration attempts.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Block direct access to known C2 infrastructure&lt;/STRONG&gt; where possible, informed by your organization’s threat‑intelligence sources.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Protect against Python‑based stealers&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Harden endpoint defenses around LOLBIN abuse&lt;/STRONG&gt;, such as certutil.exe decoding malicious payloads.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Evaluate abnormal activity involving known processes and files with suspicious file extensions&lt;/STRONG&gt;, such as a Python interpreter masquerading as svchost.exe executing a Python script disguised as a PNG file.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Microsoft also recommends the following mitigations to reduce the impact of this threat.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Turn on&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus" target="_blank" rel="noopener"&gt;cloud-delivered protection&lt;/A&gt; in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving attacker tools and techniques. Cloud-based machine learning protections block a majority of new and unknown threats.&lt;/LI&gt;
&lt;LI&gt;Run&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-endpoint/edr-in-block-mode" target="_blank" rel="noopener"&gt;EDR in block mode&lt;/A&gt; so that Microsoft Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus does not detect the threat or when Microsoft Defender Antivirus is running in passive mode. EDR in block mode works behind the scenes to remediate malicious artifacts that are detected post-breach.&lt;/LI&gt;
&lt;LI&gt;Enable network protection and web protection in Microsoft Defender for Endpoint to safeguard against malicious sites and internet-based threats.&lt;/LI&gt;
&lt;LI&gt;Encourage users to use Microsoft Edge and other web browsers that support Microsoft Defender SmartScreen, which identifies and blocks malicious websites, including phishing sites, scam sites, and sites that host malware.&lt;/LI&gt;
&lt;LI&gt;Allow&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-endpoint/automated-investigations" target="_blank" rel="noopener"&gt;investigation and remediation&lt;/A&gt; in full automated mode to allow Microsoft Defender for Endpoint to take immediate action on alerts to resolve breaches, significantly reducing alert volume.&lt;/LI&gt;
&lt;LI&gt;Turn on&amp;nbsp;&lt;A href="https://learn.microsoft.com/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection" target="_blank" rel="noopener"&gt;tamper protection features&lt;/A&gt; to prevent attackers from stopping security services. Combine tamper protection with the &lt;A href="https://learn.microsoft.com/windows/client-management/mdm/defender-csp" target="_blank" rel="noopener"&gt;DisableLocalAdminMerge&lt;/A&gt;&amp;nbsp;setting to prevent attackers from using local administrator privileges to set antivirus exclusions.&lt;/LI&gt;
&lt;LI&gt;Microsoft Defender XDR customers can also implement the following attack surface reduction rules to harden an environment against LOLBAS techniques used by threat actors:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/attack-surface-reduction-rules-reference#block-execution-of-potentially-obfuscated-scripts" target="_blank" rel="noopener"&gt;Block execution of potentially obfuscated scripts&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;A href="https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion" target="_blank" rel="noopener"&gt;Block executable files from running unless they meet a prevalence, age, or trusted list criterion&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;A href="https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content" target="_blank" rel="noopener"&gt;Block JavaScript or VBScript from launching downloaded executable content&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Microsoft Defender XDR detections&amp;nbsp; &amp;nbsp;&lt;/H1&gt;
&lt;P&gt;Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, and apps to provide integrated protection against attacks like the threat discussed in this blog.&lt;/P&gt;
&lt;P&gt;Customers with provisioned access can also use &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/security-copilot-in-microsoft-365-defender" target="_blank" rel="noopener"&gt;Microsoft Security Copilot in Microsoft Defender&lt;/A&gt; to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Tactic&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Observed activity&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender coverage&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Execution&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Encoded PowerShell commands downloading payload&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Suspicious Powershell download or encoded command execution&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Suspicious script launched&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Persistence&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Registry Run key created&lt;/P&gt;
&lt;P&gt;- Scheduled task created for recurring execution&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Anomaly detected in ASEP registry&lt;/P&gt;
&lt;P&gt;- Suspicious Scheduled Task Launched&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Defense Evasion&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Unauthorized code execution facilitated by DLL sideloading and process injection&lt;/P&gt;
&lt;P&gt;- Renamed Python interpreter executes obfuscated Python script&lt;/P&gt;
&lt;P&gt;- Decode payload with certutil&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- An executable file loaded an unexpected DLL file&lt;/P&gt;
&lt;P&gt;- A process was injected with potentially malicious code&lt;/P&gt;
&lt;P&gt;- Suspicious Python binary execution&lt;/P&gt;
&lt;P&gt;- Suspicious certutil activity&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender Antivirus&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Obfuse' malware was prevented (Trojan:Script/Obfuse!MSR)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Credential Access&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Credential and Secret Harvesting&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Possible theft of passwords and other sensitive web browser information&lt;/P&gt;
&lt;P&gt;- Suspicious access of sensitive files&lt;/P&gt;
&lt;P&gt;- Suspicious process collected data from local system&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Discovery&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Information queried using WMI and Python&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Suspicious System Hardware Discovery&lt;/P&gt;
&lt;P&gt;- Suspicious Process Discovery&lt;/P&gt;
&lt;P&gt;- Suspicious Security Software Discovery&lt;/P&gt;
&lt;P&gt;- Suspicious Peripheral Device Discovery&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Collection&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Sensitive browser information compressed into ZIP file for exfiltration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Compression of sensitive data&lt;/P&gt;
&lt;P&gt;- Suspicious Staging of Data&lt;/P&gt;
&lt;P&gt;- Suspicious archive creation&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Threat intelligence reports&lt;/H3&gt;
&lt;P&gt;Microsoft customers can use the following reports in Microsoft products to get the most up-to-date information about the threat actor, malicious activity, and techniques discussed in this blog. These reports provide the intelligence, protection information, and recommended actions to prevent, mitigate, or respond to associated threats found in customer environments.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender XDR Threat analytics&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://security.microsoft.com/intel-explorer/articles/a8c85686" target="_blank" rel="noopener"&gt;Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://security.microsoft.com/intel-explorer/articles/98626511" target="_blank" rel="noopener"&gt;From Custom Scripts to Commodity RATs: A Threat Actor’s Evolution to PureRAT&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Hunting queries&amp;nbsp;&lt;/H1&gt;
&lt;H2&gt;Microsoft Defender XDR&lt;/H2&gt;
&lt;P&gt;Microsoft Defender XDR customers can run the following queries to find related activity in their networks:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Use the following queries to identify activity related to PXA Stealer: Campaign 1&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify activity initiated by renamed python binary
DeviceProcessEvents
| where InitiatingProcessFileName endswith "svchost.exe"
| where InitiatingProcessVersionInfoOriginalFileName == "pythonw.exe"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify network connections initiated by renamed python binary
DeviceNetworkEvents
| where InitiatingProcessFileName endswith "svchost.exe"
| where InitiatingProcessVersionInfoOriginalFileName == "pythonw.exe"&lt;/LI-CODE&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Use the following queries to identify activity related to PXA Stealer: Campaign 2&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify malicious Process Execution activity
DeviceProcessEvents
| where ProcessCommandLine  has_all ("-y","x",@"C:","Users","Public", ".pdf") and ProcessCommandLine  has_any (".jpg",".png")&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify suspicious process injection activity
DeviceProcessEvents
 | where FileName == "cvtres.exe"
 | where InitiatingProcessFileName has "svchost.exe"
 | where InitiatingProcessFolderPath !contains "system32"&lt;/LI-CODE&gt;
&lt;H1&gt;Indicators of compromise&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 937px; height: 1082.84px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Indicator&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Type&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Description&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;9d867ddb54f37592fa0ba1773323e2ba563f44b894c07ebfab4d0063baa6e777&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td rowspan="8" style="height: 310.625px;"&gt;
&lt;P&gt;SHA-256&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td rowspan="8" style="height: 310.625px;"&gt;
&lt;P&gt;Payloads&amp;nbsp;related&amp;nbsp;to PXA&amp;nbsp;Stealer: Campaign 1&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;08a1f4566657a07688b905739055c2e352e316e38049487e5008fc3d1253d03b&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;5970d564b5b2f5a4723e548374d54b8f04728473a534655e52e5decef920e733&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;59855f0ec42546ce2b2e81686c1fbc51e90481c42489757ac03428c0daee6dfe&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;a5b19195f61925ede76254aaad942e978464e93c7922ed6f064fab5aad901efc&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;e7237b233fc6fda614e9e3c2eb3e03eeea94f4baf48fe8976dcc4bc9f528429e&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;59347a8b1841d33afdd70c443d1f3208dba47fe783d4c2015805bf5836cff315&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;e965eb96df16eac9266ad00d1087fce808ee29b5ee8310ac64650881bc81cf39&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 47.4089px;"&gt;&lt;td rowspan="2" style="height: 94.8178px;"&gt;
&lt;P&gt;hxxps://allecos[.]de/Documentación_del_expediente_de_derechos_de_autor_del_socio.zip&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td rowspan="2" style="height: 94.8178px;"&gt;
&lt;P&gt;URL&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td rowspan="2" style="height: 94.8178px;"&gt;
&lt;P&gt;Used to deliver initial access&amp;nbsp;ZIP&amp;nbsp;file (PXA Stealer: Campaign 1)&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 47.4089px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 47.4089px;"&gt;&lt;td style="height: 47.4089px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 94.8177px;"&gt;&lt;td style="height: 94.8177px;"&gt;
&lt;P&gt;hxxps://bagumedios[.]cloud/assets/media/others/ADN/pure&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 94.8177px;"&gt;
&lt;P&gt;URL&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 94.8177px;"&gt;
&lt;P&gt;Used to deliver&amp;nbsp;PureRAT&amp;nbsp;payload&amp;nbsp;(PXA Stealer: Campaign 1)&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 94.8177px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 47.4089px;"&gt;&lt;td style="height: 47.4089px;"&gt;
&lt;P&gt;hxxp://concursal[.]macquet[.]de/uid_page=244739642061129&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td rowspan="2" style="height: 94.8178px;"&gt;
&lt;P&gt;URL&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td rowspan="2" style="height: 94.8178px;"&gt;
&lt;P&gt;URL&amp;nbsp;contained in phishing email (PXA Stealer: Campaign 1)&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 47.4089px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 47.4089px;"&gt;&lt;td style="height: 47.4089px;"&gt;
&lt;P&gt;hxxps://tickets[.]pfoten-prinz[.]de/uid_page=118759991475831&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 47.4089px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 122.812px;"&gt;&lt;td style="height: 122.812px;"&gt;
&lt;P&gt;hxxps://erik22[.]carrd.co&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 122.812px;"&gt;
&lt;P&gt;URL&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 122.812px;"&gt;
&lt;P&gt;Used in&amp;nbsp;make&amp;nbsp;network connection and&amp;nbsp;subsequent&amp;nbsp;redirection in&amp;nbsp;(PXA Stealer: Campaign 2)&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 122.812px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 122.812px;"&gt;&lt;td style="height: 122.812px;"&gt;
&lt;P&gt;hxxps://erik22jomk77[.]card.co&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 122.812px;"&gt;
&lt;P&gt;URL&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 122.812px;"&gt;
&lt;P&gt;Used in&amp;nbsp;make&amp;nbsp;network connection and&amp;nbsp;subsequent&amp;nbsp;redirection in (PXA Stealer: Campaign 2)&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 122.812px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 34.8307px;"&gt;&lt;td rowspan="2" style="height: 69.6614px;"&gt;
&lt;P&gt;157.66.27[.]11&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td rowspan="2" style="height: 69.6614px;"&gt;
&lt;P&gt;IP Address&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td rowspan="2" style="height: 69.6614px;"&gt;
&lt;P&gt;PureRAT&amp;nbsp;C2 server (PXA Stealer: Campaign 1)&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 34.8307px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 34.8307px;"&gt;&lt;td style="height: 34.8307px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 66.8229px;"&gt;&lt;td style="height: 66.8229px;"&gt;
&lt;P&gt;195.24.236[.]116&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 66.8229px;"&gt;
&lt;P&gt;IP Address&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 66.8229px;"&gt;
&lt;P&gt;C2 server (PXA Stealer: Campaign 2)&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 66.8229px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 66.8229px;"&gt;&lt;td style="height: 66.8229px;"&gt;
&lt;P&gt;bagumedios[.]cloud&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 66.8229px;"&gt;
&lt;P&gt;Domain&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 66.8229px;"&gt;
&lt;P&gt;C2 server&amp;nbsp;(PXA Stealer: Campaign 1)&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 66.8229px;"&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Microsoft Sentinel&lt;/H1&gt;
&lt;P&gt;Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with ‘TI map’) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the &lt;A href="https://learn.microsoft.com/azure/sentinel/sentinel-solutions-deploy" target="_blank" rel="noopener"&gt;Microsoft Sentinel Content Hub&lt;/A&gt; to have the analytics rule deployed in their Sentinel workspace.&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;References&lt;/H1&gt;
&lt;P&gt;&lt;A href="https://www.huntress.com/blog/purerat-threat-actor-evolution" target="_blank" rel="noopener"&gt;A Vietnamese threat actor's shift from PXA Stealer to PureRAT | Huntress&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.sentinelone.com/labs/ghost-in-the-zip-new-pxa-stealer-and-its-telegram-powered-ecosystem/" target="_blank" rel="noopener"&gt;Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem | SentinelOne&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://wizsafe.iij.ad.jp/2025/10/2018/" target="_blank" rel="noopener"&gt;Information-Stealing Malware Distribution Campaign Using Emails Disguised as Copyright Infringement Notices – wizSafe Security Signal -Guideposts to Safety and Security- IIJ&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Learn more &amp;nbsp;&lt;/H1&gt;
&lt;P&gt;For the latest security research from the Microsoft Threat Intelligence community, check out the &lt;A href="https://aka.ms/threatintelblog" target="_blank" rel="noopener"&gt;Microsoft Threat Intelligence Blog&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;To get notified about new publications and to join discussions on social media, follow us on &lt;A href="https://www.linkedin.com/showcase/microsoft-threat-intelligence" target="_blank" rel="noopener"&gt;LinkedIn&lt;/A&gt;, &lt;A href="https://x.com/MsftSecIntel" target="_blank" rel="noopener"&gt;X (formerly Twitter)&lt;/A&gt;, and &lt;A href="https://bsky.app/profile/threatintel.microsoft.com" target="_blank" rel="noopener"&gt;Bluesky&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the &lt;A href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence" target="_blank" rel="noopener"&gt;Microsoft Threat Intelligence podcast&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/hunting-infostealers-python-stealers/ba-p/4505342</guid>
      <dc:creator>FeliciaCarter</dc:creator>
      <dc:date>2026-04-08T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Hunting Infostealers - macOS Threats</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/hunting-infostealers-macos-threats/ba-p/4494435</link>
      <description>&lt;P&gt;The “Hunting Infostealers” blog series covers the ever-evolving threat of infostealers. Infostealers have gone from simple credential theft to subscription-based threats (i.e., Malware-as-a-Service) driving modern cybercrime. Threat actors target sensitive information such as browser data, cookies, and session tokens that can later be used for account takeovers or to fuel data breaches, ransomware attacks, and supply chain attacks. In this blog series, Microsoft Defender Experts examine how modern infostealers operate across operating systems and delivery channels by blending into legitimate ecosystems and evading conventional defenses.&lt;/P&gt;
&lt;P&gt;In this first part of the series, we highlight the rise of macOS-specific infostealers—including families such as DigitStealer, MacSync, and Atomic macOS (AMOS)—that abuse native utilities, user-initiated execution flows, and social-engineering techniques like “ClickFix” installers to harvest credentials and sensitive data. Throughout the blog, we map observed activity to Microsoft Defender XDR coverage and provide actionable guidance to help organizations detect, mitigate, and respond to infostealers.&lt;/P&gt;
&lt;H2&gt;macOS Threats&lt;/H2&gt;
&lt;P&gt;Since late 2025, Microsoft Defender Experts (DEX) has observed macOS targeted infostealer campaigns delivered through social engineering techniques, including ClickFix style prompts and malicious DMG downloads. These attacks rely on user interaction to initiate execution and are designed to steal credentials, session material, and infrastructure secrets that can enable account takeover, financial theft, and follow on compromise of cloud and developer resources. Once executed, the malware abuses trusted macOS functionality to collect a wide range of personal, financial, and enterprise related information. Stolen data can include browser authentication material, operating system credential stores, access keys used for cloud services, and artifacts commonly present on developer or administrator workstations.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The potential impact of this threat extends beyond the infected device. Compromised credentials and session material can enable attackers to take over online accounts, access cloud and enterprise resources, steal cryptocurrency assets, and perform follow on intrusion activity without needing to maintain persistence on the original system. In organizational environments, this can lead to broader security incidents, including unauthorized access to internal services, cloud environments, or third-party platforms.&lt;/P&gt;
&lt;H3&gt;DigitStealer&lt;/H3&gt;
&lt;P&gt;In November 2025, Microsoft Defender Experts (DEX) identified a macOS infostealer campaign tracked as DigitStealer, delivered via a spoofed “DynamicLake” lure. The infection chain begins when users browse to a deceptive domain such as &lt;STRONG&gt;dynamiclake[.]org &lt;/STRONG&gt;and download an unsigned disk image &lt;STRONG&gt;DynamicLake.dmg&lt;/STRONG&gt;, then follow a “drag‑into‑Terminal” execution path that helps bypass Gatekeeper protections.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Dynamiclake[.]org landing page that delivers the unsigned disk image.&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;Once mounted, DigitStealer executes a Bash-based dropper that uses native tooling (notably curl) to retrieve staged payloads from Cloudflare Pages such as &lt;STRONG&gt;hxxps://b93b559cf522386018e24069ff1a8b7a[.]pages[.]dev/703d2315783f48c0563836f02a3421ed.aspx&lt;/STRONG&gt;. In subsequent stages, the malware performs host profiling with system_profiler and uses AppleScript/JXA to drive credential theft and collection, staging artifacts in temporary locations (commonly under /tmp) before compressing content into ZIP archives for outbound transfer.&lt;/P&gt;
&lt;P&gt;For exfiltration and C2, DigitStealer uses HTTPS POSTs to structured endpoints and API routes such as &lt;STRONG&gt;/api/grabber&lt;/STRONG&gt;, &lt;STRONG&gt;/api/log&lt;/STRONG&gt;, and &lt;STRONG&gt;/api/poll&lt;/STRONG&gt;, where &lt;STRONG&gt;/api/poll&lt;/STRONG&gt; is used for beaconing/tasking while upload routes handle stolen archives. Persistence is established via a macOS LaunchAgent, which can retrieve follow‑on instructions via DNS TXT records (observed use of dig + curl) and immediately execute newly fetched payloads via JXA.&lt;/P&gt;
&lt;P&gt;In higher‑value (crypto‑focused) scenarios, DigitStealer targets wallet workflows including Ledger Live, and has been observed manipulating user friction and visibility by suppressing prompts (TCC-related behavior) and tampering with wallet application assets (e.g., Ledger Live.app.asar) to facilitate hijacking.&lt;/P&gt;
&lt;H3&gt;MacSync&lt;/H3&gt;
&lt;P&gt;In December 2025, Microsoft Defender Experts (DEX) identified a fileless macOS infostealer campaign referred to as MacSync Stealer, commonly delivered via malvertising and ClickFix-style lures that instruct users to copy/paste commands into Terminal rather than running a traditional installer. DEX has broadly observed these macOS-targeted infostealer campaigns delivered through ClickFix prompts and malicious DMG downloads in late 2025.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Webpage instructing users to copy and run a command in terminal&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;During observed MacSync activity, no standalone binaries are dropped. Instead, execution is driven by an in‑memory pipeline that invokes curl with TLS verification disabled, streaming the response directly through decoding/decompression (e.g., curl … | base64 -d | gunzip) without writing intermediate files to disk. This technique reduces disk artifacts and pushes detection toward process/network telemetry rather than file hashes.&lt;/P&gt;
&lt;P&gt;MacSync then leverages osascript to indirectly invoke shell execution (e.g., sh -c) to blend into legitimate macOS automation, while harvesting a wide set of artifacts across browsers and credential stores. High‑signal targeted files include Chrome databases (Cookies / Login Data / Web Data), Firefox stores (cookies.sqlite / logins.json / key4.db /cert9.db), macOS Keychains (*.keychain-db), and developer/cloud secrets including SSH keys, AWS credentials, Kubernetes config files, plus shell history such as .zsh_history.(Observed in telemetry write‑up you provided.)&lt;/P&gt;
&lt;P&gt;Staging and exfiltration are similarly low‑footprint: data is staged under&lt;STRONG&gt; /tmp &lt;/STRONG&gt;using the pattern &lt;STRONG&gt;/tmp/sync[0-9]{7}&lt;/STRONG&gt;, compressed using the built‑in ditto utility, and exfiltrated via HTTP POST to attacker infrastructure using a legitimate macOS browser user‑agent. Requests use custom headers (including an API key) to authenticate and manage tasking. Post‑exfiltration cleanup deletes staged directories, reinforcing the transient nature of the intrusion.&lt;/P&gt;
&lt;H3&gt;Atomic Stealer (AMOS)&lt;/H3&gt;
&lt;P&gt;In January&amp;nbsp;2026, Microsoft Defender Experts (DEX) observed active exploitation by Atomic macOS Stealer (AMOS), a highly automated and full‑featured macOS infostealer capable of progressing from initial user interaction to persistent command‑and‑control within minutes. Telemetry shows a modular, high‑throughput campaign optimized for credential harvesting, cryptocurrency theft, and long‑term operator control using exclusively native macOS tooling.&lt;/P&gt;
&lt;P&gt;Initial access was achieved through redirect‑based delivery chains that guided victims through multiple intermediary domains—&lt;STRONG&gt;alliai[.]com&lt;/STRONG&gt; and &lt;STRONG&gt;alli‑ai[.]pro&lt;/STRONG&gt;—before downloading a malicious disk image (&lt;STRONG&gt;AlliAi.dmg)&lt;/STRONG&gt; hosted on newly registered infrastructure (&lt;STRONG&gt;ai[.]foqguzz[.]com&lt;/STRONG&gt;). Upon execution, the unsigned application launched under App&amp;nbsp;Translocation, indicating execution from an untrusted path and effectively bypassing Gatekeeper enforcement.&lt;/P&gt;
&lt;P&gt;Immediately after launch, the trojanized application executed its embedded binary (observed as FXSound) via xpcproxy, establishing outbound network connectivity to attacker‑controlled infrastructure (&lt;STRONG&gt;day.foqguzz[.]com&lt;/STRONG&gt;) and spawning a staged Bash loader. The loader decoded and executed a Base64‑encoded script and used curl as an ingress tool transfer mechanism to retrieve next‑stage payloads from &lt;STRONG&gt;hxxp://217.119.139[.]117/d/dayd96331&lt;/STRONG&gt;, completing a classic multi‑stage stager pattern.&lt;/P&gt;
&lt;P&gt;Once staged, AMOS executed a large modular AppleScript payload via osascript, driving extensive system discovery and data collection. Harvested artifacts included macOS Keychains (for example ~/Library/Keychains/login.keychain‑db), browser credentials and session data from Chrome, Edge, Safari, and Firefox (including SafariCookies.binarycookies), Apple Notes databases, desktop and document files, and deep inspection of browser‑based cryptocurrency wallets through IndexedDB enumeration and targeted extension directory scanning. System metadata was collected via system_profiler to uniquely identify compromised hosts and support operator tasking.&lt;/P&gt;
&lt;P&gt;Stolen data was staged under /tmp/17936/, compressed using the built‑in ditto utility into /tmp/out.zip, and exfiltrated via HTTP POST requests to&lt;STRONG&gt; hxxp://217.119.139[.]117/log&lt;/STRONG&gt;. Exfiltration requests included custom headers—such as buildid, username, and cid—to uniquely identify victims and manage backend processing. AMOS incorporated retry logic and backoff mechanisms to ensure reliable data transfer before deleting local staging artifacts.&lt;/P&gt;
&lt;P&gt;For persistence, AMOS installed a &lt;STRONG&gt;root‑level LaunchDaemon &lt;/STRONG&gt;(for example /Library/LaunchDaemons/com.&amp;lt;random&amp;gt;.plist) that re‑executed a Base64‑decoded AppleScript payload at system startup. This established a botnet‑style polling loop to endpoints such as &lt;STRONG&gt;/api/v1/bot/joinsystem/&amp;lt;botid&amp;gt;/&amp;lt;macOS_version&amp;gt;&lt;/STRONG&gt; and &lt;STRONG&gt;/api/v1/bot/actions/&amp;lt;botid&amp;gt;&lt;/STRONG&gt;, enabling operators to issue commands including doshell, repeat, enablesocks5, and uninstall. The observed activity demonstrates a mature macOS stealer architecture optimized for stealth, scalability, and continuous remote control.&lt;/P&gt;
&lt;H3&gt;Shared Characteristics Across macOS Infostealer Campaigns&lt;/H3&gt;
&lt;P&gt;Despite differences in tooling and maturity, DigitStealer, MacSync Stealer, and Atomic macOS (AMOS) exhibit a converging macOS infostealer tradecraft driven by user‑initiated execution, fileless delivery, and deep abuse of native macOS frameworks. All three campaigns rely on social engineering—such as malvertising, redirect chains, or ClickFix‑style prompts—to coerce users into mounting unsigned DMGs or executing commands directly in Terminal, effectively bypassing Gatekeeper through explicit user action.&lt;/P&gt;
&lt;P&gt;Payload delivery is predominantly fileless and multi‑stage, leveraging native utilities such as curl piped through Base64 decoding and decompression for in‑memory execution. Extensive use of AppleScript and JavaScript for Automation (JXA), alongside additional living‑off‑the‑land binaries (system_profiler, dscl, ditto, and shell interpreters), enables attackers to execute complex workflows while blending malicious activity into legitimate system automation.&lt;/P&gt;
&lt;P&gt;All three campaigns aggressively harvest credentials and sensitive artifacts from browsers, macOS Keychains, and developer or cloud environments, while explicitly probing cryptocurrency wallets to prioritize financially valuable victims. Stolen data is staged temporarily (commonly under /tmp), compressed using built‑in archiving utilities, and exfiltrated via HTTP or HTTPS POST requests that mimic legitimate browser traffic, followed by immediate cleanup. Where persistence is required, campaigns rely on LaunchAgents or LaunchDaemons and dynamic tasking mechanisms (such as C2 polling or DNS‑based updates) to maintain access without redeployment.&lt;/P&gt;
&lt;P&gt;Taken together, these behaviors highlight why macOS has become an increasingly attractive target: growing adoption in enterprise and developer environments, a rich set of built‑in automation and scripting capabilities that favor living‑off‑the‑land tradecraft, persistent user trust in installer and Terminal workflows, and the widespread presence of browser‑based and native cryptocurrency wallets on a single host. These factors have enabled the rise of scalable, high‑volume macOS infostealer ecosystems that rival traditional Windows‑centric campaigns in both sophistication and impact.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;General macOS Infostealer Attack Chain&lt;/EM&gt;&lt;/img&gt;
&lt;H2&gt;Mitigation and protection guidance&lt;/H2&gt;
&lt;P&gt;Microsoft recommends the following mitigations to reduce the impact of the macOS‑focused threats discussed in this report. These recommendations draw from established Defender blog guidance patterns and align with protections offered across Microsoft Defender XDR.&lt;/P&gt;
&lt;P&gt;Organizations can follow these recommendations to mitigate threats associated with this threat: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Strengthen user awareness &amp;amp; execution safeguards&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Educate users on social‑engineering lures&lt;/STRONG&gt;, including malvertising redirect chains, fake installers, and ClickFix‑style copy‑paste prompts common across macOS stealer campaigns such as DigitStealer, MacSync, and AMOS.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Discourage installation of unsigned DMGs or unofficial “terminal‑fix” utilities&lt;/STRONG&gt;; reinforce safe‑download practices for consumer and enterprise macOS systems.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Harden macOS environments against native tool abuse&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor for suspicious Terminal activity&lt;/STRONG&gt;—especially execution flows involving curl, Base64 decoding, gunzip, osascript, or JXA invocation, which appear across all three macOS stealers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Detect patterns of fileless execution,&lt;/STRONG&gt; such as in‑memory pipelines using curl | base64 -d | gunzip, or AppleScript‑driven system discovery and credential harvesting.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Leverage Defender’s custom detection rules to alert on abnormal access to Keychain, browser credential stores, and cloud/developer artifacts&lt;/STRONG&gt;, including SSH keys, Kubernetes configs, AWS credentials, and wallet data.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Control outbound traffic &amp;amp; staging behavior&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Inspect network egress for POST requests to newly registered or suspicious domains&lt;/STRONG&gt;—a key indicator for DigitStealer, MacSync, and AMOS.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Detect transient creation of ZIP archives under /tmp or similar ephemeral directories&lt;/STRONG&gt;, followed by outbound exfiltration attempts.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Block direct access to known C2 infrastructure&lt;/STRONG&gt; where possible, informed by your organization’s threat‑intelligence sources.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Microsoft also recommends the following mitigations to reduce the impact of this threat.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Turn on&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus" target="_blank" rel="noopener"&gt;cloud-delivered protection &lt;/A&gt;in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving attacker tools and techniques. Cloud-based machine learning protections block a majority of new and unknown threats.&lt;/LI&gt;
&lt;LI&gt;Run&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-endpoint/edr-in-block-mode" target="_blank" rel="noopener"&gt;EDR in block mode &lt;/A&gt;so that Microsoft Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus does not detect the threat or when Microsoft Defender Antivirus is running in passive mode. EDR in block mode works behind the scenes to remediate malicious artifacts that are detected post-breach.&lt;/LI&gt;
&lt;LI&gt;Enable &lt;A href="https://learn.microsoft.com/defender-endpoint/mac-preferences?ocid=magicti_ta_learndoc#enforcement-level-for-antivirus-engine" target="_blank" rel="noopener"&gt;real-time protection for macOS&lt;/A&gt; in Microsoft Defender Antivirus.&lt;/LI&gt;
&lt;LI&gt;Enable &lt;A href="https://learn.microsoft.com/defender-endpoint/mac-preferences?ocid=magicti_ta_learndoc#enabledisable-behavior-monitoring" target="_blank" rel="noopener"&gt;real-time behavior monitoring for macOS&lt;/A&gt; in Microsoft Defender Antivirus.&lt;/LI&gt;
&lt;LI&gt;Enable &lt;A href="https://learn.microsoft.com/defender-endpoint/network-protection-macos" target="_blank" rel="noopener"&gt;network protection for macOS&lt;/A&gt; in Microsoft Defender for Endpoint.&lt;/LI&gt;
&lt;LI&gt;Encourage users to use Microsoft Edge and other web browsers that support &lt;A href="https://learn.microsoft.com/deployedge/microsoft-edge-security-smartscreen" target="_blank" rel="noopener"&gt;Microsoft Defender SmartScreen&lt;/A&gt;, which identifies and blocks malicious websites, including phishing sites, scam sites, and sites that host malware.&lt;/LI&gt;
&lt;LI&gt;Allow&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-endpoint/automated-investigations" target="_blank" rel="noopener"&gt;investigation and remediation&lt;/A&gt; in full automated mode to allow Microsoft Defender for Endpoint to take immediate action on alerts to resolve breaches, significantly reducing alert volume.&lt;/LI&gt;
&lt;LI&gt;Turn on&amp;nbsp;&lt;A href="https://learn.microsoft.com/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection" target="_blank" rel="noopener"&gt;tamper protection features&lt;/A&gt; to prevent attackers from stopping security services. Combine tamper protection with the &lt;A href="https://learn.microsoft.com/windows/client-management/mdm/defender-csp" target="_blank" rel="noopener"&gt;DisableLocalAdminMerge&lt;/A&gt;&amp;nbsp;setting to prevent attackers from using local administrator privileges to set antivirus exclusions.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Microsoft Defender XDR detections&amp;nbsp; &amp;nbsp;&lt;/H1&gt;
&lt;P&gt;Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, and apps to provide integrated protection against attacks like the threat discussed in this blog.&lt;/P&gt;
&lt;P&gt;Customers with provisioned access can also use &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/security-copilot-in-microsoft-365-defender" target="_blank" rel="noopener"&gt;Microsoft Security Copilot in Microsoft Defender&lt;/A&gt; to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Tactic&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Observed activity&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender coverage&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Execution&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Execution of various commands and scripts via osascript and sh&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Suspicious piped command launched&lt;/P&gt;
&lt;P&gt;- Suspicious AppleScript activity&lt;/P&gt;
&lt;P&gt;- Suspicious script launched&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Persistence&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- LaunchAgent or LaunchDaemon for recurring execution&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Suspicious Pslist modifications&lt;/P&gt;
&lt;P&gt;- Suspicious launchctl tool activity&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender Antivirus&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Trojan:AtomicSteal.F&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Defense Evasion&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Delete data staging directories&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Suspicious path deletion&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Credential Access&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Credential and Secret Harvesting&lt;/P&gt;
&lt;P&gt;- Cryptocurrency probing&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Suspicious access of sensitive files&lt;/P&gt;
&lt;P&gt;- Suspicious process collected data from local system&lt;/P&gt;
&lt;P&gt;- Unix credentials were illegitimately accessed&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Collection&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Sensitive browser information compressed into ZIP file for exfiltration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Compression of sensitive data&lt;/P&gt;
&lt;P&gt;- Suspicious Staging of Data&lt;/P&gt;
&lt;P&gt;- Suspicious archive creation&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;Exfiltration&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Exfiltration through curl&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Suspicious file or content ingress&lt;/P&gt;
&lt;P&gt;- Network connection by osascript&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Threat intelligence reports&lt;/H3&gt;
&lt;P&gt;Microsoft customers can use the following reports in Microsoft products to get the most up-to-date information about the threat actor, malicious activity, and techniques discussed in this blog. These reports provide the intelligence, protection information, and recommended actions to prevent, mitigate, or respond to associated threats found in customer environments.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender XDR Threat analytics&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://security.microsoft.com/intel-explorer/articles/eb1efeeb" target="_blank" rel="noopener"&gt;From ClickFix to code signed: the quiet shift of MacSync Stealer malware&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://sip.security.microsoft.com/intel-explorer/articles/c3a991c6" target="_blank" rel="noopener"&gt;MacSync infostealer campaigns leverage social engineering&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Hunting queries&amp;nbsp;&lt;/H1&gt;
&lt;H2&gt;Microsoft Defender XDR&lt;/H2&gt;
&lt;P&gt;Microsoft Defender XDR customers can run the following queries to find related activity in their networks:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Use the following queries to identify activity related to DigitStealer&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify suspicious DynamicLake disk image (.dmg) mounting
DeviceProcessEvents
| where FileName has_any ('mount_hfs', 'mount')
| where ProcessCommandLine has_all ('-o nodev' , '-o quarantine')
| where ProcessCommandLine contains '/Volumes/Install DynamicLake'&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify data exfiltration to DigitStealer C2 API endpoints.
DeviceProcessEvents
| where InitiatingProcessFileName has_any ('bash', 'sh')
| where ProcessCommandLine has_all ('curl', '--retry 10')
| where ProcessCommandLine contains 'hwid='
| where ProcessCommandLine endswith "api/credentials"
        or ProcessCommandLine endswith "api/grabber"
        or ProcessCommandLine endswith "api/log"
| extend APIEndpoint = extract(@"/api/([^\s]+)", 1, ProcessCommandLine)&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Use the following queries to identify activity related to MacSync&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify exfiltration of staged data via curl
DeviceProcessEvents
| where InitiatingProcessFileName =~ "zsh" and FileName =~ "curl"
| where ProcessCommandLine has_all ("curl -k -X POST -H", "api-key: ", "--max-time", "-F file=@/tmp/", ".zip", "-F buildtxd=")&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Use the following queries to identify activity related to Atomic Stealer (AMOS)&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify suspicious AlliAi disk image (.dmg) mounting
DeviceProcessEvents
| where FileName has_any ('mount_hfs', 'mount')
| where ProcessCommandLine has_all ('-o nodev', '-o quarantine')
| where ProcessCommandLine contains '/Volumes/ALLI'&lt;/LI-CODE&gt;
&lt;H1&gt;Indicators of compromise&lt;/H1&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Indicator&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Type&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Description&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;3e20ddb90291ac17cef9913edd5ba91cd95437da86e396757c9d871a82b1282a&lt;/P&gt;
&lt;P&gt;da99f7570b37ddb3d4ed650bc33fa9fbfb883753b2c212704c10f2df12c19f63&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;SHA-256&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Payloads related to DigitStealer campaign&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;42d51feea16eac568989ab73906bbfdd41641ee3752596393a875f85ecf06417&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;SHA-256&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Payload related to Atomic Stealer (AMOS)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;217.119.139[.]117&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;IP Address&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;AMOS C2 server (AMOS campaign)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;dynamiclake[.]org&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Deceptive domain used to deliver unsigned disk image. (DigitStealer campaign)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;booksmagazinetx[.]com&lt;/P&gt;
&lt;P&gt;goldenticketsshop[.]com&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;C2 servers (DigitStealer campaign)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;b93b559cf522386018e24069ff1a8b7a[.]pages[.]dev&lt;/P&gt;
&lt;P&gt;67e5143a9ca7d2240c137ef80f2641d6[.]pages[.]dev&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;CloudFlare Pages hosting payloads. (DigitStealer campaign)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;barbermoo[.]coupons&lt;/P&gt;
&lt;P&gt;barbermoo[.]fun&lt;/P&gt;
&lt;P&gt;barbermoo[.]shop&lt;/P&gt;
&lt;P&gt;barbermoo[.]space&lt;/P&gt;
&lt;P&gt;barbermoo[.]today&lt;/P&gt;
&lt;P&gt;barbermoo[.]top&lt;/P&gt;
&lt;P&gt;barbermoo[.]world&lt;/P&gt;
&lt;P&gt;barbermoo[.]xyz&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;C2 servers (MacSync Stealer campaign)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;alli-ai[.]pro&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Deceptive domain that redirects user after CAPTCHA verification (AMOS campaign)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;ai[.]foqguzz[.]com&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Redirected domain used to deliver unsigned disk image. (AMOS campaign)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Day[.]foqguzz[.]com&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;C2 server (AMOS campaign)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H1&gt;Microsoft Sentinel&lt;/H1&gt;
&lt;P&gt;Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with ‘TI map’) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the &lt;A href="https://learn.microsoft.com/azure/sentinel/sentinel-solutions-deploy" target="_blank" rel="noopener"&gt;Microsoft Sentinel Content Hub&lt;/A&gt; to have the analytics rule deployed in their Sentinel workspace.&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;References&lt;/H1&gt;
&lt;P&gt;&lt;A href="https://www.jamf.com/blog/macsync-stealer-evolution-code-signed-swift-malware-analysis/" target="_blank" rel="noopener"&gt;MacSync Stealer Evolves: From ClickFix to Code-Signed Swift Malware — Jamf Threat Labs&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Learn more &amp;nbsp;&lt;/H1&gt;
&lt;P&gt;For the latest security research from the Microsoft Threat Intelligence community, check out the &lt;A href="https://aka.ms/threatintelblog" target="_blank" rel="noopener"&gt;Microsoft Threat Intelligence Blog&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;To get notified about new publications and to join discussions on social media, follow us on &lt;A href="https://www.linkedin.com/showcase/microsoft-threat-intelligence" target="_blank" rel="noopener"&gt;LinkedIn&lt;/A&gt;, &lt;A href="https://x.com/MsftSecIntel" target="_blank" rel="noopener"&gt;X (formerly Twitter)&lt;/A&gt;, and &lt;A href="https://bsky.app/profile/threatintel.microsoft.com" target="_blank" rel="noopener"&gt;Bluesky&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the &lt;A href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence" target="_blank" rel="noopener"&gt;Microsoft Threat Intelligence podcast&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/hunting-infostealers-macos-threats/ba-p/4494435</guid>
      <dc:creator>FeliciaCarter</dc:creator>
      <dc:date>2026-04-01T16:00:00Z</dc:date>
    </item>
    <item>
      <title>When Trust Becomes the Attack Vector: Analysis of the EmEditor Supply-Chain Compromise</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/when-trust-becomes-the-attack-vector-analysis-of-the-emeditor/ba-p/4499552</link>
      <description>&lt;P&gt;Attackers compromised the upstream distribution mechanism for &lt;STRONG&gt;EmEditor&lt;/STRONG&gt;, a widely used Windows text editor. Instead of delivering malware through phishing or malicious domains, the attackers manipulated server-side logic on the official download site to selectively serve a trojanized installer to public users while preserving legitimate content for administrators.&lt;/P&gt;
&lt;P&gt;This campaign highlights two recurring challenges in defending modern environments:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Upstream trust abuse:&lt;/STRONG&gt; Malicious payloads delivered from legitimate, trusted domains.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Selective evasion:&lt;/STRONG&gt; Conditional logic designed to evade validation, monitoring, and routine testing.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Why this matters more now&lt;/H4&gt;
&lt;P&gt;Attackers increasingly favor techniques that “live off trust” rather than exploit obvious weaknesses. As organizations harden email gateways, enforce attachment scanning, and restrict macro execution, supply-chain compromises provide an attractive alternative path to initial access.&lt;/P&gt;
&lt;P&gt;In this case, the attack required no user interaction beyond installing trusted software and relied entirely on legitimate operating system components for execution. This combination significantly reduced detection opportunities and increased the likelihood of successful compromise.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;1. Scope and unique insight&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;This is not a traditional malware delivery campaign. The distinguishing characteristics include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Server-side conditional manipulation rather than client-side redirection&lt;/LI&gt;
&lt;LI&gt;Weaponization of a legitimate MSI installer&lt;/LI&gt;
&lt;LI&gt;Use of Windows Installer custom actions to execute in-memory payloads&lt;/LI&gt;
&lt;LI&gt;Credential theft via named pipe injection without dropping additional executables.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The investigation demonstrates how endpoint, network, and installer telemetry must be correlated to uncover attacks that intentionally blur the line between legitimate and malicious activity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Server-side conditional tampering enabling selective MSI delivery.&lt;/EM&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;Attackers compromised the software distribution pipeline to selectively serve a trojanized MSI installer to public users while preserving legitimate behavior for administrators. The malicious installer abused Windows Installer execution, in-memory PowerShell staging, and command-and-control infrastructure to enable credential access.&lt;/EM&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;2. Technical analysis&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H5&gt;Discovery and investigation overview&lt;/H5&gt;
&lt;P&gt;The activity was identified through proactive threat hunting across Microsoft Defender telemetry, focusing on anomalous installer behavior and unexpected PowerShell execution chains originating from trusted software installs.&lt;/P&gt;
&lt;P&gt;Multiple signals converged during investigation:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;PowerShell execution spawned from msiexec.exe&lt;/LI&gt;
&lt;LI&gt;Network connections from installer-initiated processes to suspicious domains.&lt;/LI&gt;
&lt;LI&gt;Browser process injection without corresponding file creation events&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Together, these indicators pointed to a compromised installer rather than a post-installation infection vector.&lt;/P&gt;
&lt;H5&gt;2.1 Upstream breach: server-side tampering&lt;/H5&gt;
&lt;P&gt;The initial compromise occurred on a public-facing WordPress environment associated with the EmEditor download infrastructure. Attackers likely gained access via a vulnerable plugin or exposed administrative interface and deployed a web shell to maintain persistence.&lt;/P&gt;
&lt;P&gt;Rather than modifying core WordPress files or defacing the site, the attackers injected &lt;STRONG&gt;conditional PHP logic&lt;/STRONG&gt; into a theme-level file (footer.php). This logic dynamically altered download behaviour based on visitor context:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Authenticated administrators&lt;/STRONG&gt; were served the legitimate EmEditor MSI.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Unauthenticated public visitors&lt;/STRONG&gt; were redirected to a trojanized MSI hosted under /wp-content/uploads/.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This split-view evasion technique allowed attackers to weaponize the official domain while avoiding detection by internal validation workflows, routine administrative testing, and automated integrity checks.&lt;/P&gt;
&lt;H5&gt;2.2 Trojanized MSI installer behavior&lt;/H5&gt;
&lt;P&gt;The malicious installer closely resembled the legitimate EmEditor MSI in name and functionality but embedded a &lt;STRONG&gt;custom action&lt;/STRONG&gt; that executed during installation.&lt;/P&gt;
&lt;P&gt;Key characteristics included:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Execution via msiexec.exe -Embedding&lt;/LI&gt;
&lt;LI&gt;Silent spawning of powershell.exe&lt;/LI&gt;
&lt;LI&gt;In-memory execution using Invoke-RestMethod piped to Invoke-Expression&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The MSI was digitally signed, but not by the legitimate Emurasoft certificate. Instead, it used a certificate issued to a non-trusted publisher that nonetheless reduced user suspicion.&lt;/P&gt;
&lt;P&gt;During installation, Windows cached the MSI in C:\Windows\Installer\, enabling silent re-execution and complicating forensic reconstruction.&lt;/P&gt;
&lt;H5&gt;2.3 Command-and-control infrastructure&lt;/H5&gt;
&lt;P&gt;The PowerShell stager connected to attacker-controlled infrastructure using multiple fallback paths to ensure reliability:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Primary endpoint:&lt;/STRONG&gt; emeditorjp[.]com&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Mirror endpoint:&lt;/STRONG&gt; emeditorde[.]com, emeditorgb[.]com, emeditorsb[.]com&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Second-stage delivery:&lt;/STRONG&gt; cachingdrive[.]com&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Connections were observed over HTTP, HTTPS, and TCP, indicating deliberate redundancy. This infrastructure delivered a second-stage payload designed to operate entirely in memory.&lt;/P&gt;
&lt;H5&gt;2.4 Credential access and browser injection&lt;/H5&gt;
&lt;P&gt;The second-stage payload targeted browser processes, including chrome.exe and msedge.exe, using &lt;STRONG&gt;named pipe injection&lt;/STRONG&gt; techniques.&lt;/P&gt;
&lt;P&gt;By injecting directly into existing browser processes, the malware avoided creating new processes or dropping additional files. This enabled access to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Browser-stored credentials&lt;/LI&gt;
&lt;LI&gt;Authentication cookies&lt;/LI&gt;
&lt;LI&gt;Active session tokens for web and enterprise services&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The absence of obvious malware artifacts strongly suggests that credential theft and session hijacking were the primary objectives.&lt;/P&gt;
&lt;H5&gt;Impact and targeting&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Potential targets:&lt;/STRONG&gt; Enterprises and individual users installing EmEditor during the affected window.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Industries:&lt;/STRONG&gt; Broad, including technology, professional services, and regulated sectors&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Impact:&lt;/STRONG&gt; Credential compromise, session hijacking, potential lateral movement&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Scope:&lt;/STRONG&gt; Limited in time but high impact due to trusted distribution channel&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;3. Mitigation and protection guidance&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H5&gt;3.1 What to do now if you’re affected.&lt;/H5&gt;
&lt;P&gt;Organizations that suspect exposure should take immediate steps to contain potential compromise:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Isolate affected endpoints from the network&lt;/LI&gt;
&lt;LI&gt;Block known malicious domains and IP addresses at DNS and firewall layers.&lt;/LI&gt;
&lt;LI&gt;Force credential resets for users on impacted systems.&lt;/LI&gt;
&lt;LI&gt;Review active browser sessions and revoke tokens where possible.&lt;/LI&gt;
&lt;LI&gt;Conduct full endpoint scans using Microsoft Defender XDR&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;3.2 Defending against similar attacks.&lt;/H5&gt;
&lt;P&gt;To reduce exposure to supply-chain attacks of this nature, organizations should consider the following measures:&lt;/P&gt;
&lt;H5&gt;General security practices&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;Enforce multi-factor authentication across cloud and enterprise services.&lt;/LI&gt;
&lt;LI&gt;Limit browser-stored credentials and encourage password managers with strong protections.&lt;/LI&gt;
&lt;LI&gt;Monitor software installation activity for anomalous child process behavior.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;Endpoint and installer protections&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;Enforce stricter code-signing validation policies.&lt;/LI&gt;
&lt;LI&gt;Monitor msiexec.exe spawning scripting engines such as PowerShell.&lt;/LI&gt;
&lt;LI&gt;Apply attack surface reduction rules to limit abuse of living-off-the-land binaries.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;Microsoft Defender XDR coverage&lt;/H5&gt;
&lt;P&gt;Microsoft Defender XDR provides coordinated detection and investigation across endpoints, identities, email, and cloud applications. Relevant protections include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Detection of suspicious PowerShell execution chains&lt;/LI&gt;
&lt;LI&gt;Network-based indicators tied to known malicious infrastructure.&lt;/LI&gt;
&lt;LI&gt;Behavioral monitoring of browser process injection&lt;/LI&gt;
&lt;LI&gt;Cross-domain correlation to identify installer abuse patterns.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Customers are encouraged to review applicable detections and hunting guidance within Microsoft Defender XDR to proactively identify similar activity.&lt;/P&gt;
&lt;H4&gt;Microsoft Security Copilot&amp;nbsp;&amp;nbsp;&lt;/H4&gt;
&lt;P&gt;Security Copilot customers can use the standalone experience to&amp;nbsp;&lt;A href="https://learn.microsoft.com/copilot/security/prompting-security-copilot#create-your-own-prompts" target="_blank" rel="noopener"&gt;create their own prompts&lt;/A&gt;&amp;nbsp;or run the following&amp;nbsp;&lt;A href="https://learn.microsoft.com/copilot/security/using-promptbooks" target="_blank" rel="noopener"&gt;prebuilt promptbooks&lt;/A&gt;&amp;nbsp;to automate incident response or investigation tasks related to this threat:&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Incident investigation&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Microsoft User analysis&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Threat actor profile&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Threat Intelligence 360 report based on MDTI article&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Vulnerability impact assessment&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Advance Hunting queries - Microsoft Defender XDR&amp;nbsp;&amp;nbsp;&lt;/H4&gt;
&lt;P&gt;Microsoft Defender XDR customers can run the following query to find related activity in their networks:&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1) Detects malicious MSI downloads originating from WordPress upload paths or matching known hashes.&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;DeviceFileEvents
| where FileName endswith ".msi"
| where FileOriginUrl has_any ("/wp-content/uploads/","/uploads/MSI/","emeditor-core")
   or SHA256 in ("4bea333d3d2f2a32018cd6afe742c3b25bfcc6bfe8963179dad3940305b13c98","3d1763b037e66bbde222125a21b23fc24abd76ebab40589748ac69e2f37c27fc")
| project Timestamp, DeviceName, FileName, FolderPath, FileOriginUrl, InitiatingProcessFileName, InitiatingProcessCommandLine, SHA256 | order by Timestamp desc&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2) Correlate PowerShell stager with C2 infrastructure&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;DeviceProcessEvents
| where FileName =~ "powershell.exe"
| where ProcessCommandLine has_all ("irm", "iex")
| join kind=inner ( DeviceNetworkEvents | where RemoteUrl has_any ( "cachingdrive.com", "emeditorde.com", "emeditorgb.com", "emeditorjp.com", "emeditorsb.com" ) ) on DeviceId
 | project Timestamp, DeviceName, ProcessCommandLine, InitiatingProcessFileName, RemoteUrl, RemoteIP, Protocol
| order by Timestamp desc&lt;/LI-CODE&gt;
&lt;H4&gt;Indicator Of Compromise:&lt;/H4&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 833px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Indicator&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Type&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;4bea333d3d2f2a32018cd6afe742c3b25bfcc6bfe8963179dad3940305b13c98&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;File hash (SHA-256)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Trojanized EmEditor MSI installer delivered via compromised WordPress infrastructure&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;3d1763b037e66bbde222125a21b23fc24abd76ebab40589748ac69e2f37c27fc&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;File hash (SHA-256)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Secondary malicious MSI variant associated with the same campaign&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;hxxps://cachingdrive[.]com&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Second-stage payload delivery infrastructure&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;hxxps://emeditorde[.]com&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Stager and command-and-control infrastructure (mirror)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;hxxps://emeditorgb[.]com&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Stager and command-and-control infrastructure (regional variant)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;hxxps://emeditorjp[.]com&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Primary stager and command-and-control endpoint&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;hxxps://emeditorsb[.]com&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Stager and command-and-control infrastructure (regional variant)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;147.45.50[.]54&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;IP address&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Hosting IP associated with cachingdrive[.]com&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;46.28.70[.]245&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;IP address&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Hosting IP associated with emeditorde[.]com&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;5.101.82[.]159&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;IP address&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Hosting IP associated with emeditorgb[.]com&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;5.101.82[.]118&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;IP address&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Hosting IP associated with emeditorjp[.]com&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H4&gt;Microsoft Sentinel&amp;nbsp;&amp;nbsp;&lt;/H4&gt;
&lt;P&gt;Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with ‘TI maps) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the&amp;nbsp;&lt;A href="https://learn.microsoft.com/azure/sentinel/sentinel-solutions-deploy" target="_blank" rel="noopener"&gt;Microsoft Sentinel Content Hub&lt;/A&gt;&amp;nbsp;to have the analytics rule deployed in their Sentinel workspace.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;References&amp;nbsp;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://www.emeditor.com/general/important-follow-up-security-incident-notice-regarding-the-emeditor-installer-download-link/" target="_blank" rel="noopener"&gt;[Important] Follow-up: Security Incident Notice Regarding the EmEditor Installer Download Link – EmEditor (Text Editor)&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;Learn more&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/H4&gt;
&lt;P&gt;For the latest security research from the Microsoft Threat Intelligence community, check out the&amp;nbsp;&lt;A href="https://aka.ms/threatintelblog" target="_blank" rel="noopener"&gt;Microsoft Threat Intelligence Blog&lt;/A&gt;.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To get notified about new publications and to join discussions on social media, follow us on&amp;nbsp;&lt;A href="https://www.linkedin.com/showcase/microsoft-threat-intelligence" target="_blank" rel="noopener"&gt;LinkedIn&lt;/A&gt;,&amp;nbsp;&lt;A href="https://x.com/MsftSecIntel" target="_blank" rel="noopener"&gt;X (formerly Twitter)&lt;/A&gt;, and&amp;nbsp;&lt;A href="https://bsky.app/profile/threatintel.microsoft.com" target="_blank" rel="noopener"&gt;Bluesky&lt;/A&gt;.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the&amp;nbsp;&lt;A href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence" target="_blank" rel="noopener"&gt;Microsoft Threat Intelligence podcast&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/when-trust-becomes-the-attack-vector-analysis-of-the-emeditor/ba-p/4499552</guid>
      <dc:creator>Parth_Jamodkar</dc:creator>
      <dc:date>2026-03-10T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Cloud forensics: Forensic readiness and incident response in Azure Virtual Desktop</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/cloud-forensics-forensic-readiness-and-incident-response-in/ba-p/4488274</link>
      <description>&lt;H5&gt;&lt;STRONG&gt;Co-authors: Dan Weinstock and Christoph Dreymann&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Azure Virtual Desktop (AVD) has rapidly become a core tool for enabling remote work at scale. Consequently, it’s also emerging as a target for threat actors. Recent Microsoft Incident Response engagements show that threat actors are exploiting AVD deployments for lateral movement and persistence. By hijacking legitimate AVD user accounts, they gain what is essentially a trusted “endpoint” inside the network without having to install malware.&lt;/P&gt;
&lt;H4&gt;Why does this matter to incident responders?&lt;/H4&gt;
&lt;P&gt;AVD intrusions can be stealthy and fast-moving, and responders must be prepared to detect and investigate suspicious AVD usage quickly. AVD’s architecture is not the same as a typical endpoint or server, so traditional forensic approaches alone may fall short.&lt;/P&gt;
&lt;P&gt;This blog post focuses on how to build forensic readiness in AVD and outlines investigation strategies to handle AVD-related incidents. We’ll cover the unique forensic challenges AVD presents, methods to collect critical data and best practices to allow incident responders to approach AVD investigation with confidence.&lt;/P&gt;
&lt;H4&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216205161"&gt;&lt;/A&gt;Real-World Threat Actor Behaviors in AVD&lt;/H4&gt;
&lt;P&gt;To put theory into context, consider some &lt;STRONG&gt;real threat actor behaviors&lt;/STRONG&gt; Microsoft Incident Response – the Detection and Response Team (DART) has observed in AVD environments:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Threat actors used stolen helpdesk credentials with AVD access to log in from a foreign IP address.&lt;/LI&gt;
&lt;LI&gt;In another case, threat actors compromised identities, leveraged their AVD sessions to pivot into on-premises resources using the AVD Virtual Machine (VM) as a steppingstone to RDP into other machines for &lt;STRONG&gt;lateral movement&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Another threat actor accessed the browser in AVD to search &lt;STRONG&gt;internal SharePoint&lt;/STRONG&gt; sites for &lt;STRONG&gt;sensitive&lt;/STRONG&gt; data and intellectual property.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Once threat actors hijack a legitimate, often poorly monitored AVD session, they gain a privileged execution environment without needing to deploy traditional malware.&lt;/P&gt;
&lt;P&gt;This enables threat actors to perform identity discovery, pivot across cloud/on-premises boundaries, exfiltrate data, and stage ransomware operations, emphasizing the necessity for robust logging, monitoring, and least-privilege configurations in virtual desktop environments.&lt;/P&gt;
&lt;H4&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216205162"&gt;&lt;/A&gt;Forensic Challenges Unique to AVD&lt;/H4&gt;
&lt;P&gt;Incident responders should enable forensic readiness by combining cloud-native and traditional methods to investigate, enable core logs for visibility, and understand how profiles are distributed across VMs and remote storage.&lt;/P&gt;
&lt;H4&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216205163"&gt;&lt;/A&gt;AVD from the lens of a Threat Hunter&lt;/H4&gt;
&lt;P&gt;An understanding of AVD architecture is essential for detection and response. AVD’s distinctive management of user sessions, profiles, and application delivery presents specific benefits and complexities when monitoring adversary activity. The system has the following fundamental components:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Session Hosts &lt;/STRONG&gt;– AVD’s multi-session architecture allows multiple users (or threat actors) to share a single underlying VM. Because these hosts are often &lt;STRONG&gt;ephemeral&lt;/STRONG&gt; – frequently spun up and deallocated – offline evidence such as event logs or memory artifact can be lost quickly without proactive collection. When FSLogix is in use, user profiles are stored as VHDs in remote storage, rather than on the session host; browsing history, downloads, registry hives (i.e., NTUSER.DAT), MRU lists, and startup files live in these offloaded containers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Workspaces, Application Groups, &amp;amp; Host pools&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Workspaces&lt;/STRONG&gt; serve as the top-level container, grouping resources and providing users with a single-entry point to their virtual desktops and applications.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Application Groups&lt;/STRONG&gt; determine which apps or desktops are published and define who can access them, shaping both user experience and permissions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Host Pools&lt;/STRONG&gt;, on the other hand, are collections of session hosts – virtual machines that supply the compute power needed for user sessions.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Storage Accounts &amp;amp; FSLogix VHDs &lt;/STRONG&gt;– because FSLogix stores each user’s profile as a VHD or VHDX file on Azure Files or a similar storage solution, investigators must know how to identify and export these VHDs and analyze them using tools like Autopsy or Eric Zimmerman’s utilities to recover user-centric artifact (i.e., browser history, downloads, NTUSER.DAT registry hives). This process is crucial when FSLogix is enabled, as no user data remains on the AVD host after logout.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;&lt;EM&gt;Figure 1: AVD Components&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;The following illustration demonstrates the relationship between the key components discussed above:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 2: Relationships between key components&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216082890"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Further information on that can be found within &lt;A href="https://learn.microsoft.com/en-us/azure/architecture/example-scenario/azure-virtual-desktop/azure-virtual-desktop#relationships-between-key-logical-components" target="_blank" rel="noopener"&gt;Azure Virtual Desktop for the enterprise - Azure Architecture Center&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;This clarifies that AVD is not simply "another VM"; rather, it is an Infrastructure-as-a-Service (IaaS) offering with a corresponding &lt;A href="https://learn.microsoft.com/en-us/azure/virtual-desktop/security-recommendations#shared-security-responsibilities" target="_blank" rel="noopener"&gt;shared responsibility model&lt;/A&gt;, in which customers are accountable for identity management and the deployment of individual Azure resources.&lt;/P&gt;
&lt;H4&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216205164"&gt;&lt;/A&gt;Logging Considerations&lt;/H4&gt;
&lt;P&gt;Many actions such as user session brokering and application publishing are logged not on the VM but in Azure – &lt;EM&gt;if&lt;/EM&gt; logging is enabled. By default, Azure Monitor diagnostics logs for AVD are not turned on. If an organization hasn’t enabled these, responders may lack crucial logs like when sessions started/ended, which applications were opened, or from what client IP address. Entra ID handles AVD authentication and therefore, Entra ID sign-in logs will provide further details and should be retained appropriately as well.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Forensics implication:&lt;/STRONG&gt; Misconfigured or missing diagnostic settings can &lt;EM&gt;hide evidence&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Log sources&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The following table outlines various sources that provide comprehensive insights in the event of an incident:&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Artifact / Log Source&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Location &amp;amp; Access Method&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Host Forensics artifact&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;On the AVD session host VM.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;AVD Diagnostic Logs&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;(WVD* tables in Log Analytics)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Azure Log Analytics workspace (if AVD Diagnostic Settings were enabled for Host Pools, Workspaces, and App Groups). Access via Kusto queries in the Logs blade or via Microsoft Sentinel.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key tables&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;WVDFeeds&lt;/STRONG&gt; - Shows what published applications were visible. Also shows ClientIP and ClientType.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;WVDConnections&lt;/STRONG&gt; - Shows Client IP address, clientType, ConnectionType, ResourceAlias and which host they connected to.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;WVDCheckpoints&lt;/STRONG&gt; - Find which published App was used and Path for execution of Published App&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Entra ID Sign-In Logs&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Entra ID (Azure AD) tenant logs.&lt;/P&gt;
&lt;P&gt;Access via Azure Portal &amp;gt; Entra ID &amp;gt; Sign-in logs,&lt;/P&gt;
&lt;P&gt;or query the SigninLogs table in Sentinel/Log Analytics.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Endpoint Detection and Response (EDR)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Telemetry, for example Microsoft Defender for Endpoint (MDE) &lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Specifically for MDE, Looking at Microsoft 365 Defender portal (Devices section) or via Advanced Hunting queries (DeviceProcessEvents, DeviceNetworkEvents).&lt;/P&gt;
&lt;P&gt;This requires the AVD session host VMs to be onboarded&lt;/P&gt;
&lt;P&gt;as monitored devices in MDE.*&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Network Flow Logs (NSG and Firewall logs)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Azure Network Watcher’s NSG flow logs&lt;/P&gt;
&lt;P&gt;(if enabled on the VM’s subnet/NIC) stored in a storage account or Log Analytics; and/or Azure Firewall logs if an Azure Firewall is in the path. These may also be surfaced via Microsoft Sentinel.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;FSLogix User Profile Container (VHD/VHDX)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Stored on Azure Storage (Azure Files share or NetApp Files). Access by locating the user’s profile .vhd(x)&lt;/P&gt;
&lt;P&gt;in the storage account and downloading it (i.e., via Azure Storage Explorer or generating an SAS URL).&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;* &lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/configure-endpoints-vdi" target="_blank" rel="noopener"&gt;Onboard non-persistent virtual desktop infrastructure (VDI) devices - Microsoft Defender for Endpoint | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Enabling diagnostic logs&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Enabling diagnostic logs in AVD Azure resources offers valuable insights into session activities and remote application usage for detecting anomalies, tracing threat actor activity, and supporting forensic investigations. For threat hunting, the most relevant log tables include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;WVDFeeds&lt;/STRONG&gt; – shows which published applications were available, including ClientIP and ClientType details.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;WVDConnections&lt;/STRONG&gt; – lists information such as Client IP address, clientType, ConnectionType, ResourceAlias, and host connection data.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;WVDCheckpoints&lt;/STRONG&gt; – indicates which published application was accessed and supplies its execution path.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;You can enable these logs via the diagnostics settings for &lt;STRONG&gt;Host Pool&lt;/STRONG&gt;, &lt;STRONG&gt;Application Group&lt;/STRONG&gt;, and&lt;STRONG&gt; Workspace&lt;/STRONG&gt; Azure resources. If an incident occurs, these logs help determine exactly what a threat actor interacted with, which is vital for assessing whether additional logs should be collected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 3: Diagnostic log examples&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216082891"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;H2&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216205165"&gt;&lt;/A&gt;Forensic Data Collection Strategies&lt;/H2&gt;
&lt;P&gt;When an incident is suspected in an AVD environment, investigators need a plan for acquiring and preserving evidence:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Live vs. Offline Collection&lt;/STRONG&gt; – disk and memory artifact can be captured either from a running system or from an offline snapshot. Live collection can recover volatile data like memory (RAM) but might miss user profile content when FSLogix is in use. In such cases, focus on offline acquisition by generating a snapshot of the relevant disk or file share and downloading the associated VHD. For live or offline captures, you can leverage widely used forensic tools such as &lt;STRONG&gt;Velociraptor&lt;/STRONG&gt; (for remote collection across endpoints) or disk forensics tools like &lt;STRONG&gt;Autopsy&lt;/STRONG&gt; to extract and analyze forensic data.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Disk Snapshots&lt;/STRONG&gt; – to acquire disks for offline collection and analysis, create a snapshot of the AVD Host VM disk and export it to your designated collection and analysis environment. The high-level steps are captured &lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/windows/download-vhd?tabs=azure-portal" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Storage account &lt;/STRONG&gt;&lt;STRONG&gt;VHD Extraction&lt;/STRONG&gt; – if FSLogix is enabled, user profiles are stored as VHD containers in Azure Storage. To review user data such as browser history, downloads, NTUSER.DAT, MRU lists, startup folders, and other profile artifacts you have to download the VHD that matches the username within the Azure Storage account. More about Storage account forensics can be found within &lt;A href="https://techcommunity.microsoft.com/blog/microsoftsecurityexperts/cloud-forensics-why-enabling-microsoft-azure-storage-account-logs-matters/4445723" target="_blank" rel="noopener"&gt;Cloud forensics: Why enabling Microsoft Azure Storage Account logs matters&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;&lt;EM&gt;Figure 4: File share&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216082892"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216205166"&gt;&lt;/A&gt;Artifact Analysis: What to Look for on a Host&lt;/H4&gt;
&lt;P&gt;Once the user’s profile VHD and VM Host disk snapshot are acquired, analysts should focus on:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Browser Data &lt;/STRONG&gt;–&lt;STRONG&gt; &lt;/STRONG&gt;cached web history, downloads, and session cookies can reveal malicious downloads or credential collection attempts. Threat actors frequently exploit post-breach browser access to scrape credentials, hijack sessions, or implant malicious extensions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;User Registry Hives &lt;/STRONG&gt;– files like NTUSER.DAT contain valuable user-specific configuration settings and MRU (Most Recently Used) lists that can reveal executed commands or opened documents.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Startup Items and Temporary Directories &lt;/STRONG&gt;– malicious payloads or scripts often persist by storing components in startup folders or system temp directories. These may be visible only within the user VHD if FSLogix is in use.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Jump Lists and Shell Bags &lt;/STRONG&gt;– these systems cache file access and folder navigation actions, offering timelines and insights into threat actoractivities.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216205167"&gt;&lt;/A&gt;Threat Hunting in AVD Environments&lt;/H4&gt;
&lt;P&gt;Threat hunting in AVD environments requires three critical dimensions: Identity, Azure platform, and host/endpoint artifact. Each layer provides unique signals and telemetry that, when correlated, help uncover malicious activity and reduce dwell time.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Identity &lt;/STRONG&gt;– investigate authentication patterns, privilege escalations, and anomalous sign-ins across Entra ID and related identity providers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure &lt;/STRONG&gt;– examine control-plane operations, resource configurations, and subscription-level activities for indicators of compromise or persistence mechanisms.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Host/Endpoint Artifacts &lt;/STRONG&gt;– analyze session hosts for forensic traces such as browser history, file events, and registry changes that may reveal lateral movement or payload deployment.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By combining insights from these components, defenders can build a threat-hunting strategy tailored for AVD’s distributed architecture.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 5: Threat hunting in AVD&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216082893"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216205168"&gt;&lt;/A&gt;Core Hunting Objectives&lt;/H4&gt;
&lt;P&gt;When hunting in AVD environments, start with three fundamental questions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Where&lt;/STRONG&gt; &lt;STRONG&gt;did the threat actor log in from?&lt;/STRONG&gt; – identify unusual or foreign IP addresses and devices accessing your host pools.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;What&lt;/STRONG&gt; &lt;STRONG&gt;did they do once inside?&lt;/STRONG&gt; – track actions within the session host, such as which applications were launched, commands executed, or files accessed.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Where did they go next?&lt;/STRONG&gt; – look for lateral movement to other resources (cloud or on-premises) and evidence of persistence (i.e., credential artifacts, backdoor accounts).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These questions form the basis for iterative, hypothesis-driven hunts, allowing you to “follow the thread” and adapt as you uncover new evidence – be it new accounts, unexpected machines, or suspicious process trees.&lt;/P&gt;
&lt;P&gt;The following diagram illustrates a standard hunting process from the initial event through hunting within the entire environment and cross-domain correlation:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 6: Investigation Analysis Pathway&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216082894"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Today’s security tools can make this process easier. &lt;STRONG&gt;Microsoft Sentinel&lt;/STRONG&gt; combines Entra ID logs, AVD diagnostics, and MDE events into one place, so you can use KQL queries and workbooks to link related data, like joining Sign-in Logs and WVDConnections using the same user and timestamp.&lt;/P&gt;
&lt;P&gt;With MDE’s Advanced Hunting feature, you can query across endpoints; for example, you might review all AVD host devices for certain indicators or activity patterns, such as listing processes that ran during a suspected breach. The aim is to build a complete picture of the incident.&lt;/P&gt;
&lt;H4&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216205169"&gt;&lt;/A&gt;Sample Hunting Queries&lt;/H4&gt;
&lt;P&gt;Below are example Sentinel queries tailored to address the core hunting objectives. These should be adapted to your environment and replace dummy values with real user names, host identifiers, or IP ranges.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Where&lt;/STRONG&gt; &lt;STRONG&gt;did the threat actor log in from?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Hunt for the suspicious user in the Entra Sign-in logs:&lt;/P&gt;
&lt;LI-CODE lang=""&gt;SigninLogs
| where TimeGenerated &amp;gt;= ago(7d) //update to reflect specific time period of interest
| where UserPrincipalName has "&amp;lt;&amp;lt;Suspicious User&amp;gt;&amp;gt;"
| where AppDisplayName has "Azure Virtual Desktop
| project-reorder TimeGenerated, UserPrincipalName, AppDisplayName, ResultType, ClientAppUsed, DeviceDetail, IPAddress, UserAgent
| summarize FirstDate=min(TimeGenerated), LastDate=max(TimeGenerated), count() by  UserPrincipalName, AppDisplayName, ClientAppUsed, IPAddress, UserAgent&lt;/LI-CODE&gt;
&lt;P&gt;Sign-in events to AVD always use the below Entra Applications. Both the application name and ID can be hunted on:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 7: AVD Entra Application IDs&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216082895"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What&lt;/STRONG&gt; &lt;STRONG&gt;did they do once inside?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;To investigate a potential security incident within AVD, it is important to review the user activity within the diagnostic logs. Therefore, we are looking next into the diagnostic logs tables WVDFeeds, WVDConnections, and WVDCheckpoints to get a better understanding of what has happened:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;WVDFeeds&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Displays the published applications that are accessible, as well as the ClientIP and ClientType information.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;WVDFeeds
| where TimeGenerated &amp;gt;= ago(7d) //update to reflect specific time period of interest
| where UserName has &amp;lt;&amp;lt;UserName&amp;gt;&amp;gt;
//splitting the IP as the ClientIP is shown with port i.e. 1.1.1.1:54282
| extend ClientIP = tostring(split(ClientSideIPAddress, ":")[0])
| summarize FirstDate = min(TimeGenerated), LastDate = max(TimeGenerated), count() by UserName, ClientOS, ClientType, ClientIP&lt;/LI-CODE&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;WVDConnections&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Displays the Client IP address, client type, connection type (Desktop or App), resource alias, and the host (from the host pool) to which the client has connected.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;WVDConnections
| where TimeGenerated &amp;gt;= ago(7d) //update to reflect specific time period of interest
| where UserName has &amp;lt;&amp;lt;UserName&amp;gt;&amp;gt;
| project-reorder TimeGenerated, UserName,ClientSideIPAddress, ClientOS, ConnectionType, SessionHostName, SessionHostPoolType, State
| sort by TimeGenerated asc&lt;/LI-CODE&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;WVDCheckpoints&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Determine which published application was utilized. It shows also the Operation conducted when a session was started.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;WVDCheckpoints
| where TimeGenerated &amp;gt;= ago(7d) //update to reflect specific time period of interest
| extend ConnectionStage = tostring(Parameters.connectionStage)
| extend AppFileName = tostring(Parameters.filename) //It is only populated when it published App and not Desktop Session
| extend Operation= Name
| project-reorder TimeGenerated, UserName, ActivityType, Source, Operation, AppFileName, ConnectionStage&lt;/LI-CODE&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Advanced Hunting in Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Now that the AVD host has been identified, you can then deep dive further by focusing on EDR and host forensic logs. If MDE Advanced Hunting is enabled, the following tables helps often to understand what happened on a system:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;DeviceNetworkEvents&lt;/LI&gt;
&lt;LI&gt;DeviceProcessEvents&lt;/LI&gt;
&lt;LI&gt;DeviceRegistryEvents&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Further tables within MDE and the Device Timeline help to get a full picture of what happened.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Lateral Movement&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;After gaining access to an AVD session host, threat actors often attempt lateral movement to expand their foothold or establish persistence. This can involve pivoting to other session hosts, Azure resources, or even on-premises systems.&lt;/P&gt;
&lt;P&gt;Focus on the following tables/log sources:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Firewall logs (On premise / Cloud)&lt;/LI&gt;
&lt;LI&gt;DeviceNetworkEvents (Cloud: Defender)&lt;/LI&gt;
&lt;LI&gt;DeviceProcessEvents (Cloud: Defender)&lt;/LI&gt;
&lt;LI&gt;DeviceRegistryEvents (Cloud: Defender)&lt;/LI&gt;
&lt;LI&gt;NSG logs (Diagnostic Logs)&lt;/LI&gt;
&lt;LI&gt;Windows EventsLogs (Collected host logs)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216205170"&gt;&lt;/A&gt;Best Practices for AVD Forensic Readiness&lt;/H4&gt;
&lt;P&gt;The following measures enhance forensic processes for Azure Virtual Desktop:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Implement an endpoint detection and response product&lt;/STRONG&gt; – deploy an endpoint detection and response (EDR) solution to provide advanced detection and response capabilities on AVD VMs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable and export comprehensive logging&lt;/STRONG&gt; – activate diagnostic logging for all host pools, workspaces, and application groups. Ensure these logs are exported to a Log Analytics workspace or a security information and event management (SIEM) platform such as Microsoft Sentinel.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Develop forensic workflows for AVD&lt;/STRONG&gt; – establish and document clear forensic workflows for AVD incident response. This should cover the entire process, from detecting suspicious activity, through live or offline evidence acquisition, to verifying FSLogix profile stores, exporting VHDs, and analyzing collected artifacts.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216205171"&gt;&lt;/A&gt;Security Recommendations for Azure Virtual Desktop&lt;/H4&gt;
&lt;P&gt;When implementing AVD, it is vital to follow recommended security practices. These strategies complement the best practices for forensic readiness and ensure that both proactive and reactive security measures are in place.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Review Microsoft AVD Security Guidance &lt;/STRONG&gt;– utilize the official Microsoft documentation for &lt;A href="https://learn.microsoft.com/en-us/azure/virtual-desktop/security-recommendations" target="_blank" rel="noopener"&gt;Azure Virtual Desktop security&lt;/A&gt; to guide your deployment and operational security policies. The resource provides up-to-date recommendations on securing your AVD environment.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable MFA on all users&lt;/STRONG&gt; – implement multi-factor authentication (MFA) for every user accessing Azure Virtual Desktop to ensure an additional layer of security beyond just passwords.
&lt;UL&gt;
&lt;LI&gt;Where possible, implement&amp;nbsp;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;phish-resistant MFA&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; for maximum protection. If full adoption isn’t practical, prioritize high-risk accounts and critical roles first.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable Conditional Access&lt;/STRONG&gt; – utilize Conditional Access policies to proactively manage and mitigate risks before granting access to your AVD environment. This helps ensure only legitimate users and trusted devices can connect to your resources.
&lt;UL&gt;
&lt;LI&gt;Regularly &lt;STRONG&gt;review&lt;/STRONG&gt; Conditional Access policies for exceptions and minimize them wherever possible. Implement detection and alerting for any changes to CAP configurations to maintain a strong security posture.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;More information can be found in the following article from Microsoft - &lt;A href="https://learn.microsoft.com/en-us/azure/virtual-desktop/security-recommendations" target="_blank" rel="noopener"&gt;Security recommendations for Azure Virtual Desktop - Azure Virtual Desktop | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc216205172"&gt;&lt;/A&gt;Conclusion&lt;/H4&gt;
&lt;P&gt;As the threat landscape evolves, cloud-hosted virtual desktops become both enablers of productivity and channels for threat actor persistence. By applying robust logging configurations, understanding the unique forensic challenges of FSLogix and AVD, and enhancing your threat hunting capabilities, you can achieve higher levels of forensic readiness. This preparedness not only accelerates investigations when incidents occur but also strengthens the overall security posture of your organization. Proactive planning today is essential to respond to tomorrow’s threats with confidence and clarity.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Feb 2026 17:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/cloud-forensics-forensic-readiness-and-incident-response-in/ba-p/4488274</guid>
      <dc:creator>Dan_Weinstock</dc:creator>
      <dc:date>2026-02-03T17:00:00Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender Experts Disrupt Jasper Sleet’s Insider Access Campaign</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/microsoft-defender-experts-disrupt-jasper-sleet-s-insider-access/ba-p/4478112</link>
      <description>&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-teams="true"&gt;By: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-user" href="https://techcommunity.microsoft.com/users/mukta_agarwal/1315570" target="_blank" rel="noopener" data-lia-auto-title="Mukta Agarwal" data-lia-auto-title-active="0"&gt;Mukta Agarwal&lt;/A&gt; and&amp;nbsp;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-user" href="https://techcommunity.microsoft.com/users/parth_jamodkar/3302093" target="_blank" rel="noopener" data-lia-auto-title=" Parth Jamodkar" data-lia-auto-title-active="0"&gt; Parth Jamodkar&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Threat actors are increasingly infiltrating organizations by securing legitimate jobs, often through falsified credentials or insider recruitment.&lt;/P&gt;
&lt;P&gt;Recently, Microsoft Defender Experts, powered by Microsoft Threat Intelligence, successfully thwarted a sophisticated campaign by &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/06/30/jasper-sleet-north-korean-remote-it-workers-evolving-tactics-to-infiltrate-organizations/" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Jasper Sleet&lt;/STRONG&gt;&lt;/A&gt; (formerly Storm-0287), a North Korean state-sponsored threat actor known for stealthy infiltration tactics. Rather than compromising victims directly, these actors pose as job applicants or contractors, infiltrating organizations to gain long-term insider access under false identities. Organizations in the information technology segment throughout the United States have been the primary targets for Jasper Sleet. However, as this threat actor has grown more sophisticated and expanded their reach, other industries including consumer retail, healthcare, financial services, critical manufacturing, and energy across different regions have also become targets.&lt;/P&gt;
&lt;H3&gt;The challenge&lt;/H3&gt;
&lt;P&gt;Jasper Sleet leveraged social engineering and identity fraud to bypass traditional security controls. By impersonating remote IT contractors, the actors blend into legitimate workflows, using shared devices for MFA and VPN services to mask their origin. These tactics enabled persistence through long-lived sessions and authentication tokens, creating a high risk of privilege abuse and data exfiltration if left undetected.&lt;/P&gt;
&lt;H3&gt;Indicators observed during investigation&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Shared devices for MFA:&lt;/STRONG&gt; During authentication analysis, it was observed that a single device was repeatedly used to complete multifactor authentication (MFA) for multiple user accounts within the same tenant. MFA is intended to enforce strong identity assurance by binding authentication to a unique user-device pairing. When this control is circumvented, it raises a security concern. Further investigation revealed consistent technical signals across these events, including identical session identifiers, common ISP, and geolocation. Such behavior is strongly indicative of fraudulent personas operating from shared workstations, pooled environments such as Azure Virtual Desktop (AVD), or compromised devices.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Suspicious login patterns:&lt;/STRONG&gt; Initial access attempts originated from US or Western IP addresses to simulate remote work, followed by logins from Russian, Chinese, or other Asian IPs and often linked to VPN services such as Astrill. Certain sessions exhibited AVD-like login patterns originating from Russian-based instances.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Session persistence:&lt;/STRONG&gt; Long-lived authentication sessions, (such as non-password based) cookies and tokens allow malicious insiders to maintain access even after password resets, as these tokens often remain valid without re-authentication.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Together, these behaviors pointed to a stealthy, long-term operation designed to blend in with legitimate activity and maintain persistent access through pre-existing privileges associated with IT roles.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Behavioral indicators mappings&lt;/img&gt;
&lt;P&gt;&lt;STRONG&gt;Defender Experts response&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Defender Experts took a proactive approach by meticulously analyzing the suspicious behavioral patterns and successfully uncovering multiple customers who had been impacted by the Jasper Sleet campaign. Upon identification, we immediately reached out to the affected organizations through managed response and Defender Expert Notifications, ensuring they were promptly informed about the threat and the necessary actions to be taken. Recognizing the potential for broader impact, we also issued proactive threat advisories to all Defender Experts customers. We actively engaged with the customers, initiating collaborative sessions to validate the attack vectors, discuss findings, and the recommended steps. This open channel of communication fostered a collective defense posture, where shared intelligence and real-time feedback between Defender Experts and customer teams amplified the speed and effectiveness of the response.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Actions included:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Immediate alerts to affected organizations via Defender Experts Notifications titled “Microsoft &lt;STRONG&gt;Defender Experts: Potential malicious activity linked to threat actor observed in your environment&lt;/STRONG&gt;”, which included observed indicators and recommendations.&lt;/LI&gt;
&lt;LI&gt;Proactive threat advisories to all Defender Experts customers (subject- Microsoft &lt;STRONG&gt;Defender Experts Threat Advisory: Jasper Sleet&lt;/STRONG&gt;), informing them of key adversarial tactics, impact, and encouraging them to remain vigilant and review their own environments for similar indicators of compromise.&lt;/LI&gt;
&lt;LI&gt;Direct collaboration with customers to facilitate joint sessions aimed at validating attack vectors and discussing findings.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Outcome and impact&lt;/H3&gt;
&lt;P&gt;The coordinated and transparent partnership between Defender Experts and our customers played a critical role in containing the threat before it could escalate. Customers responded promptly by disabling compromised contract employee accounts, effectively mitigating the risk of further misuse. Through these actions, customers addressed immediate risks and strengthened their long-term security posture by implementing best practices and incorporating lessons learned from the incident.&lt;/P&gt;
&lt;P&gt;This case highlights the significant value of robust collaboration between Defender Experts and customers in countering sophisticated, targeted cyber-attacks, demonstrating that collective efforts enhance the ability to defend against evolving threats. &lt;STRONG&gt;Together, we are stronger and more capable of defending against evolving threats.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers reported that timely alerts and expert guidance prevented downstream compromise and strengthened their security posture. Some of the testimonials from the customers:&lt;/P&gt;
&lt;P&gt;“&lt;STRONG&gt;&lt;EM&gt;A big thank you to the Microsoft team for all their efforts and coordination in detecting this, which has been immensely helpful.”&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;“Appreciate Defender Experts for finding this. You guys just signed next year’s renewal with this"&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3&gt;Key takeaways (public safe metrics)&lt;/H3&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Impact Area&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Metric&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Alerts and logs analyzed&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&amp;gt;10,000 correlated logs and events&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Organizations protected&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;40 + enterprise tenants&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Defender proactive notifications&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;Over 200+ sent&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Time to notify&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&amp;lt; 30 mins, immediately after first detection&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H4&gt;Reference&amp;nbsp;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2025%2F06%2F30%2Fjasper-sleet-north-korean-remote-it-workers-evolving-tactics-to-infiltrate-organizations%2F&amp;amp;data=05%7C02%7Cdpersaud%40microsoft.com%7Cba876a6abce14ec9a7d408de0c4b606c%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638961715080652770%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=LcUl5RPZdMmCs6RPYmv40D6Zc0Bx1KAA2QAdHuoETpQ%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations | Microsoft Security Blog&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Stay vigilant - Stay protected&lt;/STRONG&gt;&lt;BR /&gt;Learn more about how Microsoft Defender Experts can help safeguard your organisation against sophisticated threats. Partner with &lt;STRONG&gt;Microsoft Defender Experts&lt;/STRONG&gt; to stay ahead of advanced threats and protect your organization with confidence.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/services/microsoft-defender-experts-xdr" target="_blank" rel="noopener"&gt;Microsoft Defender Experts for XDR&lt;/A&gt; - Expert-led monitoring and response across your extended detection and response&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/services/microsoft-defender-experts-hunting" target="_blank" rel="noopener"&gt;Microsoft Defender Experts for Hunting&lt;/A&gt; - Proactive threat hunting to identify and stop attacks before they impact your business.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-teams="true"&gt;By: &lt;A href="https://techcommunity.microsoft.com/users/mukta_agarwal/1315570" target="_blank" rel="noopener" data-lia-auto-title="Mukta Agarwal" data-lia-auto-title-active="0"&gt;Mukta Agarwal&lt;/A&gt; and&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/users/parth_jamodkar/3302093" target="_blank" rel="noopener" data-lia-auto-title=" Parth Jamodkar" data-lia-auto-title-active="0"&gt; Parth Jamodkar&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;</description>
      <pubDate>Wed, 28 Jan 2026 23:21:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/microsoft-defender-experts-disrupt-jasper-sleet-s-insider-access/ba-p/4478112</guid>
      <dc:creator>Mukta_Agarwal</dc:creator>
      <dc:date>2026-01-28T23:21:36Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender Experts - S.T.A.R. Series</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/microsoft-defender-experts-s-t-a-r-series/ba-p/4472199</link>
      <description>&lt;H4&gt;&lt;STRONG&gt;Co-author: Samantha Gardener&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;To stay ahead of today’s sophisticated cyber threats, organizations must embrace a proactive defense strategy that includes these three pillars: emerging trends, adaptive strategies, and actionable insights.&lt;/P&gt;
&lt;P&gt;Threat actors are increasingly leveraging AI-driven attacks, supply chain compromises, and identity-based exploits. Modern strategies focus on zero trust principles, continuous threat hunting, and leveraging advanced threat intelligence to predict and neutralize risks before they escalate. By integrating real-time analytics, automated response capabilities, and cross-platform visibility, security teams can transform insights into decisive action to help ensure resilience against evolving attack vectors and safeguard critical assets in an ever-changing landscape&lt;/P&gt;
&lt;P&gt;Our popular S.T.A.R. webinar series features panels of our experts who discuss trends, strategies, and insights that will help you defend against today’s sophisticated threats.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Gain Expert Insights: Learn from Microsoft Defender Experts who share their knowledge on the latest threats and trends in cybersecurity.&lt;/LI&gt;
&lt;LI&gt;Bolster their Security Program: Receive actionable guidance and strategies to effectively combat emerging threats and strengthen defenses.&lt;/LI&gt;
&lt;LI&gt;Meet the Experts: Get to know the Defender Experts and understand their roles in safeguarding organizations.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For additional insights, some episodes are accompanied by informative blogs that include even include real-world threat hunting patterns&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Microsoft Defender Experts - S.T.A.R. series episodes&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H5&gt;&lt;STRONG&gt;Episode 1 - November 2024&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;Crafting Chaos: The Amplified Tactics of Social Engineering - Hunt, Halt, and Evict&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flivesend.microsoft.com%2Fi%2FinbppvGnl___jhsgNaCyNpPLUSSIGNJLVGqLQJG5eYeFUlZvUx4DT___94KlU8jeKlVz74JiJiEvpgerLLWj4IYtFTWHcOcsAyuGAENns2GJ8pO___Q3JPDe3LfQ6XdLoWSB28gGYHOot&amp;amp;data=05%7C02%7Cv-smithemi%40microsoft.com%7C09d7cd930bf64cfd38e408de3d8eba2d%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639015880391567335%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=0JXPg79BhGVbdU8GCUjTX4DXRg8zej29%2BgFBNesOrO0%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Ep. 1- Crafting Chaos: The Amplified Tactics of Social Engineering&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H5&gt;Description&lt;/H5&gt;
&lt;P&gt;Explore amplified tactics of social engineering with our Defender Experts. We cover&amp;nbsp;&lt;STRONG&gt;Quick Assist email spam floods&lt;/STRONG&gt;,&amp;nbsp;&lt;STRONG&gt;RMM tool abuse&lt;/STRONG&gt;, and the&amp;nbsp;&lt;STRONG&gt;ClickFix Powershell copy/paste&lt;/STRONG&gt; technique. We highlight how attackers leverage legitimate services like SharePoint, Dropbox, and Google Drive for phishing campaigns.&lt;/P&gt;
&lt;H5&gt;Key Topics:&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Quick Assist Email Spam Flood: &lt;/STRONG&gt;Abusing QuickAssist to gain initial access and deploy ransomware.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;RMM Tools: &lt;/STRONG&gt;Increased abuse of RMM tools for delivering trojans or infostealers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;ClickFix Powershell Copy/Paste: &lt;/STRONG&gt;Users tricked into copying and pasting malicious code.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Abuse of File Hosting Platforms: &lt;/STRONG&gt;Using legitimate services for phishing campaigns.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Advanced Hunting Queries: &lt;/STRONG&gt;KQL queries for detecting suspicious activities.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;Video Link&lt;/H5&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=Wbe0jFq-Hfs&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=5" target="_blank" rel="noopener"&gt;Episode 1 - Crafting Chaos: The Amplified Tactics of Social Engineering - Hunt, Halt, and Evict&lt;/A&gt;&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=Wbe0jFq-Hfs&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=5/1764030336033" data-video-remote-vid="https://www.youtube.com/watch?v=Wbe0jFq-Hfs&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=5/1764030336033" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FWbe0jFq-Hfs%3Flist%3DPLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DWbe0jFq-Hfs&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FWbe0jFq-Hfs%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H5&gt;&lt;STRONG&gt;Episode 2 - February 2025&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;Rise of Infostealers, ClickFix, and More&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flivesend.microsoft.com%2Fi%2FinbppvGnl___jhsgNaCyNpPLUSSIGNJLVGqLQJG5eYeFUlZvUx4BljD7QQ___PleBsbiaYOpow1S9P6m1r___5iFTLwWIB___hV55T1OdqJRAx899IKqJg4mkvpItyqfW8KAe0fPxzhY37t&amp;amp;data=05%7C02%7Cv-smithemi%40microsoft.com%7C09d7cd930bf64cfd38e408de3d8eba2d%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639015880391592314%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=q4Xx24dJEErVlzIiIW3st8RjU9YoPWObhS5y1LoVWco%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Ep. 2 – Rise of InfoStealers&lt;/A&gt;&lt;/P&gt;
&lt;H5&gt;Description&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;Delve&lt;/STRONG&gt; into the latest threat landscape, featuring notorious actors like Hazel Sandstorm, Sangria Tempest, and Midnight Blizzard. Understand the insidious&amp;nbsp;&lt;STRONG&gt;ClickFix technique&lt;/STRONG&gt;, a social engineering marvel that exploits users' natural tendencies to click prompts and buttons. Learn more about the growing trend of&amp;nbsp;&lt;STRONG&gt;renamed binaries&lt;/STRONG&gt;&amp;nbsp;and how adversaries are using them to evade detection.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Topics:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Infostealers Unveiled: &lt;/STRONG&gt;Functions and examples of infostealers like LummaStealer, DarkGate, and DanaBot.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;ClickFix Technique: &lt;/STRONG&gt;Combining phishing, malvertising, and malicious scripting.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Identity Compromise: &lt;/STRONG&gt;Techniques like AiTM, BiTM, and BiTB attacks.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Advanced Hunting Queries: &lt;/STRONG&gt;KQL queries for detecting suspicious activities&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;Video Link&lt;/H5&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=REdzIV2zbTw&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=4" target="_blank" rel="noopener"&gt;Episode 2 - Rise of Infostealers, ClickFix, and More&lt;/A&gt;&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=REdzIV2zbTw&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=4/1764030362552" data-video-remote-vid="https://www.youtube.com/watch?v=REdzIV2zbTw&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=4/1764030362552" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FREdzIV2zbTw%3Flist%3DPLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DREdzIV2zbTw&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FREdzIV2zbTw%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H5&gt;&lt;STRONG&gt;Episode 3 - June 2025&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;The Case Against ClickFix&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flivesend.microsoft.com%2Fi%2FinbppvGnl___jhsgNaCyNpPLUSSIGNJLVGqLQJG5eYeFUlZvUx4Dg0izlQ1PLUSSIGNgObPBykq8vv3P2XPLUSSIGNqQuetTcmWtL974KhixkgD87vgZRRWLC___vxle1hFDZ8Tc___4xcT7C1lO69bmLz1&amp;amp;data=05%7C02%7Cv-smithemi%40microsoft.com%7C09d7cd930bf64cfd38e408de3d8eba2d%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639015880391611580%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=8JvPqX%2FFP7jDxdfL0oFKqbFVPunt4kAD1TBb4q5Ceck%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Ep. 3 – Case Against ClickFix&lt;/A&gt;&lt;/P&gt;
&lt;H5&gt;Description&lt;/H5&gt;
&lt;P&gt;Deep dive into the ClickFix technique, a rising social engineering threat that manipulates users into executing malicious scripts through fake prompts like CAPTCHA verifications.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Topics&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;How adversaries are leveraging ClickFix to deploy infostealers, remote access tools, and loaders, while also evading detection through renamed binaries and obfuscated scripting.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Technique:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ClickFix combines phishing, malvertising, and drive-by compromises with fake CAPTCHA overlays. Users are tricked into copying and executing malicious commands via the Windows Run dialog.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Compromise:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ClickFix mimics identity compromise tactics by hijacking user trust, using spoofed interfaces, clipboard hijacking, and executing obfuscated scripts via LOLBins like PowerShell, mshta, and rundll32.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Advanced Hunting Queries (AHQs):&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Suspicious RunMRU registry entries.&lt;/LI&gt;
&lt;LI&gt;Use of LOLBins and obfuscated PowerShell commands.&lt;/LI&gt;
&lt;LI&gt;Indicators such as shortened URLs, fake CAPTCHA text, and encoded payloads.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;Video Link&lt;/H5&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=Fq0SD4NAZzw&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=3" target="_blank" rel="noopener"&gt;Episode 3 - The Case Against ClickFix&lt;/A&gt;&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=Fq0SD4NAZzw&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=3/1764030386965" data-video-remote-vid="https://www.youtube.com/watch?v=Fq0SD4NAZzw&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=3/1764030386965" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FFq0SD4NAZzw%3Flist%3DPLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DFq0SD4NAZzw&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FFq0SD4NAZzw%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;A class="lia-anchor" target="_blank" name="_Toc206595727"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Episode 4 - Aug 2025&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;Post-Breach Browsers: The Hidden Threat You’re Overlooking&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flivesend.microsoft.com%2Fi%2FinbppvGnl___jhsgNaCyNpPLUSSIGNJLVGqLQJG5eYeFUlZvUx4C1C___89x6eqmPLUSSIGNEnozJaM3Xw___q3BRuJlmYzQ0Tk8NOOl4D3ozw2QDmgdyUs4GFzCiH5NhqBgcEX3xev4pwl7QNp2&amp;amp;data=05%7C02%7Cv-smithemi%40microsoft.com%7C09d7cd930bf64cfd38e408de3d8eba2d%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639015880391630998%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=RlpaD1sIuI%2BY9KADRCsl7yBJaq7MEuVxbpAk0AH%2Fzq8%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Ep. 4- Post-Breach Attacks on Modern Browsers&lt;/A&gt;&lt;/P&gt;
&lt;H5&gt;Description&lt;/H5&gt;
&lt;P&gt;Modern browsers aren’t just attack entry points; they’re post-breach goldmines. In this episode, Microsoft Defender Experts are joined by JBO, the architect behind cross-platform research at Microsoft Defender and a leading voice in offensive security, exploitation, and vulnerability research.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Topics:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Post-Breach Tradecraft&lt;/STRONG&gt;&lt;BR /&gt;How adversaries weaponize browser memory, debugging ports, and extensions to maintain access and evade detection.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Detection That Cuts Through the Noise&lt;/STRONG&gt;&lt;BR /&gt;Spot stealthy abuse: anomalous COM calls, rogue child processes, TLS key leaks, and more.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Expert-Led Defense&lt;/STRONG&gt;&lt;BR /&gt;JBO and the Defender Experts team bring real-world insights from the frontlines, including techniques used to uncover and mitigate browser-based threats across Windows, macOS, and Linux.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you think browser security ends at patching, think again. This episode is your essential guide to defending against the post-breach browser threatscape.&lt;/P&gt;
&lt;H5&gt;Video Link&lt;/H5&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=BEiO8UfpjEk&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=2" target="_blank" rel="noopener"&gt;Episode 4 - Post-Breach Browsers: The Hidden Threat You’re Overlooking&lt;/A&gt;&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=BEiO8UfpjEk&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=2/1764030410887" data-video-remote-vid="https://www.youtube.com/watch?v=BEiO8UfpjEk&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=2/1764030410887" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FBEiO8UfpjEk%3Flist%3DPLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DBEiO8UfpjEk&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FBEiO8UfpjEk%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H5&gt;Learn more – read the blog&lt;/H5&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftsecurityexperts/post-breach-browser-abuse-a-new-frontier-for-threat-actors/4445722" target="_blank" rel="noopener"&gt;Post-breach browser abuse: a new frontier for threat actors | Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Modern browsers are among the most complex and trusted applications on any endpoint. While they are often discussed in the context of initial access (through phishing, drive-by downloads, or zero-day exploits) this post focuses on a less explored but increasingly relevant threat vector: post-breach browser abuse.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Episode 5 – October 2025 &lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;TCC You Later: Spotlights Metadata Mischief in macOS&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flivesend.microsoft.com%2Fi%2FinbppvGnl___jhsgNaCyNpPLUSSIGNJLVGqLQJG5eYeFUlZvUx4CaxOu7d0kPLUSSIGNqe3qkiv6Np3WvJH7fSOJjK3n5y5wK8v___fVIbWUVUaHXkm74___Ba6jbnKfkOh7k0aQBp59KANz___tNt&amp;amp;data=05%7C02%7Cv-smithemi%40microsoft.com%7C09d7cd930bf64cfd38e408de3d8eba2d%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639015880391805841%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=gLhFO1W16aRURuD%2Bp2TbiD1wLB8fECN10AsgLGhnsUE%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Ep. 5 - TCC You Later&lt;/A&gt;&lt;/P&gt;
&lt;H5&gt;Description&lt;/H5&gt;
&lt;P&gt;Threat actors are exploiting overlooked macOS features. Join our experts as they discuss trends, strategies, and insights that will help you defend against this new attack vector.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Topics:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Understand how AI features and Spotlight indexing expose sensitive metadata, while weaknesses in TCC controls increase exploitation potential.&lt;/LI&gt;
&lt;LI&gt;Learn how unsigned Spotlight plugins can bypass privacy safeguards, granting access to confidential files and Apple Intelligence data.&lt;/LI&gt;
&lt;LI&gt;Defend better by strengthening detection for anomalous Spotlight activity, enforce patching, and manage updates through Intune for proactive defense.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;Video Link&lt;/H5&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=1jhUcYVbCHc&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=1" target="_blank" rel="noopener"&gt;Episode 5 - TCC You Later: Spotlights Metadata Mischief in macOS&lt;/A&gt;&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=1jhUcYVbCHc&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=1/1764030438031" data-video-remote-vid="https://www.youtube.com/watch?v=1jhUcYVbCHc&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=1/1764030438031" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F1jhUcYVbCHc%3Flist%3DPLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D1jhUcYVbCHc&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F1jhUcYVbCHc%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Episode 6 – February 2026&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Shai&amp;nbsp;Hulud&amp;nbsp;2.0 - Breaking the Supply Chain Chaos Engine&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://livesend.microsoft.com/i/inbppvGnl___jhsgNaCyNpPLUSSIGNJLVGqLQJG5eYeFUlZvUx4Da5JImeFZMRIfW4aK5jeK5W7kcxizR7QJIe0iT07bNSVSLHjifbCTdb01ZDvrkPbl80tSaEVi1aWkeMvO7tNzP" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Ep. 6 –&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Halting&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Shai&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Hulud&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;2.0&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;with&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;MISA&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;partner&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Ontinue&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;SPAN data-contrast="auto"&gt;Description&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Together with&amp;nbsp;our MISA partner,&amp;nbsp;Ontinue, we&amp;nbsp;will&amp;nbsp;unlock&amp;nbsp;supply-chain attacks&amp;nbsp;and&amp;nbsp;drill into&amp;nbsp;campaigns like “Shai&amp;nbsp;Hulud.”&amp;nbsp;Learn&amp;nbsp;how attackers abuse trust and developer workflows, why detection is challenging, and&amp;nbsp;gain&amp;nbsp;practical&amp;nbsp;insight on&amp;nbsp;using Microsoft Defender to strengthen CI/CD and supply-chain security.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Key Topics&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Evolution of Software Supply&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;‑&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Chain Attacks:&amp;nbsp;NotPetya, CCleaner, ASUS&amp;nbsp;ShadowHammer, SolarWinds, 3CX, to&amp;nbsp;XZ Utils.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;NPM Ecosystem Risks &amp;amp; Abuse:&amp;nbsp;Why attackers target Node Package Manager (NPM).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Breaking down&amp;nbsp;‘Shai&amp;nbsp;Hulud’:&amp;nbsp;Attack&amp;nbsp;flow &amp;amp;&amp;nbsp;detection,&amp;nbsp;scripts, lifecycle hooks, automated propagation&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Why is detection hard: trust abuse&amp;nbsp;vs.&amp;nbsp;exploit&amp;nbsp;abuse.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Defend Better:&amp;nbsp;Hunting queries,&amp;nbsp;GitHub&amp;nbsp;security,&amp;nbsp;Defender tools&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="6" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Locking down your supply chain:&amp;nbsp;CI/CD hardening, credential rotation, SBOM-based scanning, agentless code scanning,&amp;nbsp;optimize&amp;nbsp;Defender.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;SPAN data-contrast="auto"&gt;Video Link&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://www.youtube.com/watch?v=QCsrrwYjZKc" target="_blank" rel="noopener"&gt;Episode 6 - Shai Hulud 2.0: Breaking the Supply Chain Chaos Engine&lt;/A&gt;&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/QCsrrwYjZKc?si=LdaFILLlsaVPLUAU/1771880015857" data-video-remote-vid="https://youtu.be/QCsrrwYjZKc?si=LdaFILLlsaVPLUAU/1771880015857" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FQCsrrwYjZKc%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DQCsrrwYjZKc&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FQCsrrwYjZKc%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H5&gt;&lt;STRONG&gt;Episode 7 – March 2026&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Runtime Reality Check – from poisoned packages to AI workloads as adversaries&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.youtube.com/watch?v=6NnnELwrPxw&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=2" target="_blank"&gt;Episode 7 – Runtime Reality Check – from poisoned packages to AI workloads as adversaries. - YouTube&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H5&gt;&lt;SPAN data-contrast="auto"&gt;Description&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;Cloud attackers are gaining the insider advantage. In this latest S.T.A.R. video episode, our team reveals how the latest attacks are bypassing perimeters to strike directly in cloud runtimes.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Topics&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Learn how adversaries inject malicious code into dependencies and exploit package managers.&lt;/LI&gt;
&lt;LI&gt;See how attackers use AI-powered attacks &amp;amp; compromised AI workloads to create faster-evolving threats.&lt;/LI&gt;
&lt;LI&gt;Discover how Defender detects intrusions inside Kubernetes and correlates kill chain signals.&lt;/LI&gt;
&lt;LI&gt;Understand hands-on skills and KQL queries you can use today to detect these threats.&lt;/LI&gt;
&lt;LI&gt;Watch the kill-chain unfold and see how to close detection gaps.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Video Link&lt;BR /&gt;&lt;A href="https://www.youtube.com/watch?v=6NnnELwrPxw&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=2" target="_blank"&gt;Episode 7 – Runtime Reality Check – from poisoned packages to AI workloads as adversaries. - YouTube&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=6NnnELwrPxw&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=2/1774469984118" data-video-remote-vid="https://www.youtube.com/watch?v=6NnnELwrPxw&amp;amp;list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;index=2/1774469984118" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F6NnnELwrPxw%3Flist%3DPLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D6NnnELwrPxw&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F6NnnELwrPxw%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H5&gt;Learn more – read the blog&lt;/H5&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftsecurityexperts/the-invisible-attack-surface-hunting-ai-threats-in-defender-xdr/4468195" target="_blank" rel="noopener"&gt;The invisible attack surface: hunting AI threats in Defender XDR | Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;As organizations embed AI across their business, the same technology that drives productivity also introduces a new class of risk: prompts that can be manipulated, data that can be leaked, and AI systems that can be tricked into doing things they shouldn’t. Attackers are already testing these boundaries, and defenders need visibility into how AI is being used - not just where it’s deployed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;Follow us for more S.T.A.R. episodes - &lt;A href="https://www.microsoft.com/en-us/security/business/services/microsoft-defender-experts-xdr?msockid=13c014a69e526bdc33a2001f9ff56a60" target="_blank" rel="noopener"&gt;Microsoft Defender Experts for XDR | Microsoft Security&lt;/A&gt;&lt;/H5&gt;</description>
      <pubDate>Wed, 25 Mar 2026 20:21:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/microsoft-defender-experts-s-t-a-r-series/ba-p/4472199</guid>
      <dc:creator>Raae_</dc:creator>
      <dc:date>2026-03-25T20:21:06Z</dc:date>
    </item>
    <item>
      <title>Meet DART, the people behind Microsoft Incident Response</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/meet-dart-the-people-behind-microsoft-incident-response/ba-p/4457416</link>
      <description>&lt;P&gt;When threat actors infiltrate a company to steal documents and other critical business information, Microsoft Incident Response - the Detection and Response Team (DART) responds. With more than 4,500 engagements in 2024 and more than a millennium of combined experience, these responders are the calm in the storm when a compromise occurs. &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Whether they’re confronting ransomware, nation-state actors, or zero-day exploits, DART blends their knowledge and years of experience with agility, empathy, and storytelling to guide organizations from disruption to clarity.&lt;/P&gt;
&lt;P&gt;This blog introduces the people behind DART, which includes forensic analysts, infrastructure specialists, and threat hunters whose mission is to contain attacks, restore trust, and build resilience for the future.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;DART&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;DART isn’t just a lifeline during a crisis, they’re strategic partners in building cyber resilience before threat actors strike. Through a suite of proactive services, the team helps organizations identify vulnerabilities, harden critical systems, and prepare for the unexpected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Proactive offerings like compromise assessments, identity reviews, and threat briefings allow customers to uncover hidden risks and receive tailored recommendations without the pressure of an active breach. By leveraging Microsoft’s vast threat intelligence and engineering access, organizations gain insights into emerging tactics and trends, ensuring their security posture evolves ahead of the threat landscape. In short, DART empowers defenders to out-think threat actors by mapping potential pathways, closing gaps, and rehearsing responses - so when the real thing happens, they’re ready.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Cyber Frontier: Real-World Insights from Microsoft &amp;amp; DART&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The cyber threat landscape is constantly evolving, forcing defenders to rethink traditional security models. The past year, DART has observed shifts in tactics driven by the rise of AI and the relentless pursuit of identity compromise. Threat actors are no longer just exploiting vulnerabilities; they’re weaponizing automation, scaling social engineering, and monetizing stolen access in ways that blur the line between cybercrime and organized business models. In this new paradigm, resilience, global collaboration, and anticipatory defense aren’t optional; they’re survival.&lt;/P&gt;
&lt;P&gt;Microsoft Digital Defense Report 2025&lt;A href="#community--1-_ftn1" target="_blank" rel="noopener" name="_ftnref1"&gt;[1]&lt;/A&gt; ranks the largest causes of cyberattacks and prominent trends:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Phishing remained the most common initial access method. While there were many changes in the threat landscape, multifactor authentication (MFA) still blocks over 99% of unauthorized access attempts, making it the single most important security measure an organization can implement.&lt;/LI&gt;
&lt;LI&gt;While phishing remains a common initial access method, campaigns are moving away from simple phishing as defense approaches evolve. Threat actors increasingly leverage multi-stage attack chains that mix technical exploits and social engineering to gain unauthorized access and maintain persistence.&lt;/LI&gt;
&lt;LI&gt;In more than 90% of cases where cyberattacks progressed to the ransom stage, the threat actor had leveraged unmanaged devices in the network.&lt;SUP&gt; &lt;/SUP&gt;This highlights the impact of gaps in endpoint visibility on threat actor progression.&lt;/LI&gt;
&lt;LI&gt;Just as businesses are leveraging generative AI for productivity gains, threat actors are also using AI to augment traditional cyberattacks by automating activities from vulnerability discovery to deepfake content generation.&lt;/LI&gt;
&lt;LI&gt;As AI adoption becomes increasingly commonplace, these tools’ access to proprietary and sensitive data has also made AI systems an attractive target for malicious activity.&lt;/LI&gt;
&lt;LI&gt;Nation-state actor and ransomware-as-a-service (RaaS) actor activity also evolved, moving away from centralized command-and-control servers and instead leveraging cover, peer-to-peer networks to avoid detection and survive through takedowns by redistributing workloads across participants.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5&gt;&lt;STRONG&gt;Meet some of the DARTians&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;DART members are a diverse and highly skilled team of individuals with the depth of expertise and experience to solve problems quickly. They continually adjust their actions based on what they learn. They can lock down a network, isolate an endpoint, or remove a threat actor before damage is done. CISOs, security teams, and our IR people share this common passion, commitment, and goal - to protect organizations against threats. &lt;STRONG&gt;We recently interviewed several of our team members about how they got into IR work, their most memorable engagements, advice they have for customers, and more. Here are some key highlights from those interviews:&lt;/STRONG&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;How did you get your start?&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;EM&gt;“My journey began in 2005 when I enlisted in the US Marines and was assigned to the data field, managing servers, routers, and switches, and ensuring the network kept running smoothly. That technical foundation soon led me to a cybersecurity role for the Marine Corps at Quantico, where I first tasted what it meant to defend against real threats.&amp;nbsp;As a Security Operations Center (SOC) analyst, I quickly discovered that cybersecurity is both broad and deep. It opened my eyes to how vulnerabilities are exploited and how a simple oversight can become a major incident.”&lt;/EM&gt; – Edwin &lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“My path into cybersecurity wasn’t exactly a straight line. During the early parts of my career, I worked in business advisory and enterprise sales and was pursuing a path to an MBA from one of the major business schools. While corporate strategy and incident response may feel worlds apart, being able to bridge both has been my tactical advantage in working with our customers to demystify the events that take place in the cyber trenches I now call home.”&lt;/EM&gt; – Pru&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“The idea of tracking digital adversaries and solving complex puzzles always fascinated me, so when an opportunity arose in 2014 to join a Cyber Warfare unit, I took it. It felt like stepping into a story told in the movies, only the stakes were real, and the learning was relentless.”&lt;/EM&gt; – Max&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Most memorable DART engagement moments&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;EM&gt;“We quickly gained trusted advisor status and were brought into the investigation. Together, we uncovered internet-facing servers with weak permissions that allowed the threat actor to pivot between on-premises and cloud environments using privileged accounts. In the end, we shut down the threat actor’s access, rebuilt compromised systems, reduced excessive permissions, and delivered a roadmap to strengthen defenses.”&lt;/EM&gt; – Adrian&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Advice for customers&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;EM&gt;"Nearly every major incident we see starts with compromised identity: weak credentials, stolen passwords, or missed phishing alerts. Enabling multi-factor authentication (MFA) is critical.” &lt;/EM&gt;– Max&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“Proactive defense pays off: Tools like Secure Score and strategies such as the tiering model can drastically reduce risk. Don’t wait until an incident to play catch up and try to fortify defenses while also putting out a fire, it is best to act now.”&lt;/EM&gt; – Edwin&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“It may sound simple or even boring, but over 99% of cyberattacks can be prevented with MFA in place. It’s the digital equivalent of locking your front door and having an alarm system, and it’s easy and inexpensive to implement.”&lt;/EM&gt; – Pru&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“Teamwork is essential: No one succeeds in cybersecurity alone. Collaboration, both within your team and across organizations, is often the deciding factor in a successful response.”&lt;/EM&gt; – Adrian&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“Tools powered by AI, like Microsoft Copilot, have become invaluable in helping to quickly analyze suspicious processes, understand command lines, and connect the dots in complex investigations.”&lt;/EM&gt; – Max&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Building a safer digital world, together&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;DART doesn’t just solve technical problems - they help people through some of the most challenging moments of their careers. Every compromise is a puzzle, every engagement a chance to restore trust and build resilience. What drives them isn’t just the scale or complexity of the work - it’s the impact they can make, one incident at a time.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Learn more&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;To learn more about Microsoft’s Incident Response capabilities and DART, please visit &lt;A href="https://www.microsoft.com/security/business/microsoft-incident-response" target="_blank" rel="noopener"&gt;Microsoft Incident Response | Microsoft Security&lt;/A&gt;. Read the latest installment of the Cybersecurity Series. To read more about Microsoft Incident Response in action, read our latest installment of the Cyberattack Series, &lt;A href="https://www.microsoft.com/security/blog/2025/09/24/retail-at-risk-how-one-alert-uncovered-a-persistent-cyberthreat/" target="_blank" rel="noopener"&gt;Retail at risk: How one alert uncovered a persistent cyberthreat&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Sources&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;1 &lt;A href="https://www.microsoft.com/en-us/corporate-responsibility/cybersecurity/microsoft-digital-defense-report-2025/?msockid=13c014a69e526bdc33a2001f9ff56a60" target="_blank" rel="noopener"&gt;Microsoft Digital Defense Report 2025 | Microsoft&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Nov 2025 17:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/meet-dart-the-people-behind-microsoft-incident-response/ba-p/4457416</guid>
      <dc:creator>Zophar</dc:creator>
      <dc:date>2025-11-25T17:00:00Z</dc:date>
    </item>
    <item>
      <title>Charting the Future of SOC: Human and AI Collaboration for Better Security</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/charting-the-future-of-soc-human-and-ai-collaboration-for-better/ba-p/4470688</link>
      <description>&lt;H5&gt;&lt;STRONG&gt;Co-authors: &lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Sylvie Liu, Principa&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;l Product Manager&lt;/SPAN&gt; &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Rajiv Bharadwaja, Principal Software Engineering Manager&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Abhishek Kumar, Principal Group Manager - Security Research &amp;amp; Operations&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Security operations centers are under pressure from unprecedented scale and complexity. Speed, precision, and consistency matter more than ever, and AI is everywhere—but hype alone doesn’t solve the challenge. This blog shares our journey and insights from building autonomous AI agents for MDR operations and explores how the shift to a GenAI-powered SOC redefines collaboration between humans and AI.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Beyond our managed services, &lt;A href="https://www.microsoft.com/en-us/security/business/services/microsoft-defender-experts-xdr" target="_blank" rel="noopener"&gt;Microsoft Defender Experts&lt;/A&gt; strive to be a trusted partner in SOC evolution, helping customers across the broader security ecosystem to anticipate process changes, plan for upskilling, and adopt agentic workflows with confidence.&lt;/P&gt;
&lt;H2&gt;From Vision to Reality: Building the SOC of the Future&lt;/H2&gt;
&lt;P&gt;Attackers are evolving at unprecedented speed, using AI to outpace defenses scale. Defender Experts is pioneering the transformation to build the SOC of the future by integrating advanced AI capabilities into our SOC workflows, which is critical for today’s threat landscape. We’ve seen AI deliver real results—in our earlier &lt;A href="https://techcommunity.microsoft.com/blog/microsoftsecurityexperts/how-microsoft-defender-experts-uses-ai-to-cut-through-the-noise/4443601" target="_blank" rel="noopener"&gt;blog&lt;/A&gt;, we shared how Defender Experts applies AI to cut through noise without compromising on detecting real threats, enabling 50% of noise to be triaged automatically with high precision.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Autonomous AI agents are foundational to the SOC of the future. Our vision is a predictive, adaptive model where agentic AI and automation remove manual toil, accelerate contextual insight, and execute both single tasks and complex workflows. Analysts are elevated, acting as orchestrators of governed action, driving high-impact decisions, and continuously tuning the system for transparency and trust. Agents handle repetitive, time-intensive tasks, while humans remain the final authority for strategic outcomes. Together, this creates a SOC that moves from reactive alert handling to proactive, explainable defense. It is always auditable and under human governance.&lt;/P&gt;
&lt;H2&gt;How Microsoft Defender Experts is Pioneering This Shift&lt;/H2&gt;
&lt;P&gt;Defender Experts builds autonomous AI agents with expert knowledge, expert-defined guardrails and human-in-the-loop validation to deliver structured, trustworthy outputs that accelerate investigations without compromising quality. These AI agents are designed to drive efficiency and consistency across our MDR operations, helping us respond to the threats faster and with confidence.&lt;/P&gt;
&lt;P&gt;As we advance this model, we’re not only improving speed and precision, we’re redefining our security operations. That means rethinking SOC analyst roles, skill composition, workflow design, the tooling support, the accompanying automation, and the evaluation and monitoring systems needed to maintain trust.&lt;/P&gt;
&lt;P&gt;Abhishek Kumar, lead of the Defender Experts security operations team, is deeply engaged in this transformation as we build the GenAI-powered SOC. From Abhishek’s perspective “This is an exciting era for anyone in security research and operations. We are seeing a monumental shift where security analysts and threat hunters are elevating the role from handling routine tasks, to delivering high value insights. AI agents are rapidly reducing analyst fatigue and freeing up essential time, allowing experts to focus on critical thinking and contextual analysis of incidents."&lt;/P&gt;
&lt;P&gt;Agents are not just a productivity leap, they're enabling analysts and hunters to better investigate emerging and hidden threats, develop more hypotheses, and connect clues to unravel complex campaigns. Time once spent on repetitive work is now devoted to advanced tasks like posture data analysis, traversing security graphs, and using cross-product intelligence to uncover novel threats and threat actor infrastructure.&lt;/P&gt;
&lt;P&gt;Another way the autonomous AI agents are helping is by reducing cognitive loads on humans and enabling interactions with agents to achieve specific outcomes. For example, if there are hundreds of login attempts from unfamiliar locations, probably only one or two may be worth deeper investigations as they have additional insights attached to them which could be surfaced quickly by the agent. Similarly, an end point process tree that could take significant effort for humans to analyze can be done much faster with the agent to spot suspicious anomalies. To maximize the impact, one important skill needed by SOC analysts is to be able to craft and finetune prompts to get the right insights with GenAI.&lt;/P&gt;
&lt;H2&gt;Inside the Technology: How We Bring Autonomous Agents to Life&lt;/H2&gt;
&lt;P&gt;Behind the scenes, delivering trustworthy GenAI-based solutions at scale requires rigorous engineering and continuous collaboration with the security operations teams. We’ve built AI agents on a foundation of expert-defined guardrails, curated test sets, and deployment-time checks to ensure reliability. Engineers, security analysts and researchers collaborated to refine workflows, enhance precision, and broaden coverage as the agents adapt to real-world threats. Each workflow begins under human oversight, reinforced by efficient engineering and analyst feedback loops that accelerate development while upholding security, privacy, and compliance standards.&lt;/P&gt;
&lt;P&gt;This transformation also demanded deep integration into Defender Experts core systems, from case management to remediation services, requiring ground-up engineering to accommodate long-running GenAI-based workflows alongside asynchronous backend processes. There is also a need for an orchestration engine that coordinates multi-layer automations, enabling rule-based logic, GenAI-powered features, and traditional AI models to work seamlessly together with the autonomous AI agents to maximize quality, efficiency and cost-effectiveness.&lt;/P&gt;
&lt;P&gt;The impact is clear: AI agents are now running on 75% of the phishing and malware incidents landing in the Defender Experts analyst queue. The AI agents autonomously arrive at the verdict determination, justification with data-backed summaries, customer-side queries for verification, and actionable remediation steps. With this combined Human and AI agent approach, we resolve incidents nearly 72% faster while maintaining quality and transparency.&lt;/P&gt;
&lt;P&gt;To achieve this, we follow a deliberate development and release journey. We start with internal evaluation on historic cases under strict privacy and compliance controls, establishing baselines for precision, recall, and quality. Next, we deploy the agents in “dark mode,” where agents investigate side-by-side with human analysts, enabling close monitoring and iterative improvements. From there, we move into pilot with customer design partners to validate methods and gather feedback, before expanding for broader adoption —all with human backstop for review and validation. This disciplined autonomous AI agent development approach ensures that every step balances autonomy with oversight, giving customers confidence that advanced AI capabilities are grounded in proven outcomes and designed to strengthen resilience at scale.&lt;/P&gt;
&lt;H2&gt;Preparing for the Future&lt;/H2&gt;
&lt;P&gt;Our experience developing autonomous AI agents and deploying them in real MDR operations has reinforced our vision for the SOC of the future, a collaborative model where humans remain in the driver’s seat to teach and lead, working alongside AI agents rather than being replaced by them. Together, they create faster, smarter, and more resilient security operations.&lt;/P&gt;
&lt;P&gt;As SOC teams embrace the shift to GenAI‑powered operations, these insights reflect the journey we’ve taken and offer practical guidance to help navigate the transformation with confidence:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Anticipate Process Changes&lt;/STRONG&gt;: SOC teams will not follow the same workflows as before. Prepare for evolving processes and establish a lifecycle for AI and agent adoption with confidence.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Foster Mindset Shift&lt;/STRONG&gt;: Analysts used to traditional approaches often find it challenging to adopt new methods (e.g., running Kusto queries vs. writing prompts, run full end to end investigation vs. leveraging the agent output). Plan for change management and provide training to ease this transition.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Evolving SOC Skills&lt;/STRONG&gt;: Analyst roles are shifting in a GenAI-powered SOC. Analysts need to build expertise in prompt engineering, moving beyond manual case investigations to focus on advanced tasks such as posture data analysis and leveraging cross-product intelligence to uncover novel threats and map threat actor infrastructure. These evolving skills position analysts as strategic decision-makers, building collaboration between humans and AI to maximize effectiveness.&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Build Trust and Confidence&lt;/STRONG&gt;: As security operations adopt AI agents, maintain a strong human–AI feedback loop. Guardrails and human oversight are essential for trustworthy automation.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Plan for Multi-layer AI and Automation&lt;/STRONG&gt;: Automation continues to play a critical role in security operations. Explore how to orchestrate traditional automation and AI together to achieve efficiency, cost-effectiveness, and consistent quality.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;As we evolve toward the SOC of the future, we’re learning what it takes to make human and AI collaboration successful, and we’ll continue sharing those insights as we reimagine security operations together.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 18:48:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/charting-the-future-of-soc-human-and-ai-collaboration-for-better/ba-p/4470688</guid>
      <dc:creator>Sylvie_Liu</dc:creator>
      <dc:date>2025-11-18T18:48:18Z</dc:date>
    </item>
    <item>
      <title>Sploitlight: Hunting Beyond the Patch</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/sploitlight-hunting-beyond-the-patch/ba-p/4463549</link>
      <description>&lt;P&gt;Many people aren’t aware that Microsoft security isn't just about Microsoft, it’s also about the platforms supporting the products we build. This means our reach extends across all operating systems: iOS, Android, Linux, and macOS!&lt;/P&gt;
&lt;P&gt;In early 2025 Microsoft disclosed &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/07/28/sploitlight-analyzing-a-spotlight-based-macos-tcc-vulnerability/?msockid=0c26ff02eacf60412c63e90feb3f6146" target="_blank" rel="noopener"&gt;CVE-2025-31199&lt;/A&gt;, a macOS vulnerability that abused Spotlight, macOS’s metadata importer framework to bypass Transparency, Consent, and Control (TCC). &amp;nbsp;After the Defender team reported this to Apple, a patch was released that closed the hole. But, the underlying behavior behind the threat still matters to Microsoft! Once attackers learn that trusted macOS services can be redirected, they will reuse the method for nefarious purposes, so it is important to track them down. The next variant won’t look the same, and Spotlight is a commonly targeted service. [1] So, in this article, we teach you how to hunt beyond the patch!&lt;/P&gt;
&lt;H3&gt;Why Hunt for Sploitlight&lt;/H3&gt;
&lt;P&gt;Spotlight importers (.mdimporter) extend macOS indexing. They normally process metadata for search visibility. Attackers can twist that design to index protected files, extract sensitive data, or trigger code execution, perhaps with elevated system trust and privileges. Even with the patch in place, the same logic paths remain valuable targets for attackers. We recommend hunting for patterns around importers, indexing behavior, and TCC privileged binaries to help detect attempts to rebuild this chain of abuse.&lt;/P&gt;
&lt;H3&gt;Advanced Hunting Queries (AHQs)&lt;/H3&gt;
&lt;H4&gt;1. Detect Unusual Spotlight Importer Activity&lt;/H4&gt;
&lt;P&gt;Looking for manual invocations of mdimport may tip you off to attacker activity&lt;/P&gt;
&lt;LI-CODE lang=""&gt;DeviceProcessEvents

|where ProcessCommandLine contains "mdimport"&lt;/LI-CODE&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;EM&gt;OR&lt;/EM&gt;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;DeviceProcessEvents

| where ProcessCommandLine contains "mdimport"

| where isempty(extract(@"-(\w+)", 1, ProcessCommandLine)) == false

| extend mdimportFlag = extract(@"-(\w+)", 1, ProcessCommandLine)

| where mdimportFlag in~ ("r", "i", "t", "L")&lt;/LI-CODE&gt;
&lt;P&gt;&lt;STRONG&gt;Why it’s important:&lt;/STRONG&gt;&lt;BR /&gt;A Spotlight plugin being developed or tested will be called from the command line using the mdimport utility. For a wide-sweeping query, just search for mdimport alone.&amp;nbsp; However, to get more granular, you can search for it with common parameters such as "r", "i", "t", or "L".&lt;/P&gt;
&lt;H4&gt;2. Investigate Anomalous Spotlight Activity&lt;/H4&gt;
&lt;P&gt;Use this query to monitor Spotlight activity in the background&lt;/P&gt;
&lt;LI-CODE lang=""&gt;DeviceProcessEvents

| where FileName in~ ("mdworker", "mdworker_shared")&lt;/LI-CODE&gt;&lt;img&gt;30 Day Timeline&lt;/img&gt;
&lt;P&gt;&lt;STRONG&gt;Why it’s important:&lt;/STRONG&gt;&lt;BR /&gt;The Advanced Hunting Portal creates timelines for you to quickly zoom in on abnormal behavior, and peaks can show when new Spotlight plugins are invoked.&lt;/P&gt;
&lt;H3&gt;Defender Recommendations&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;Establish a baseline of normal Spotlight activity before setting detection thresholds.&lt;/LI&gt;
&lt;LI&gt;Tag importer activity by TCC domain to surface unexpected access.&lt;/LI&gt;
&lt;LI&gt;Correlate unsigned importer drops with system events such as privilege escalation or installer execution.&lt;/LI&gt;
&lt;LI&gt;Deploy these AHQs in Microsoft Defender XDR or Sentinel for continuous telemetry review.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;The Bigger Picture&lt;/H3&gt;
&lt;P&gt;The point isn’t to memorize CVEs. It’s to understand the logic that made them possible and look for it everywhere else. Threat actors don’t repeat exploits; they repeat success patterns. Visibility is the only real control. If a process touches data, moves it, or indexes it, it’s part of your attack surface. Treat it that way.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;👉 Join the &lt;STRONG&gt;Defender Experts S.T.A.R. Forum&lt;/STRONG&gt; to see Sploitlight detection strategies and live hunting demonstrations: &lt;A href="https://youtube.com/playlist?list=PLmAptfqzxVEXNqF--ySIIb5Kl4AdDv2Ud&amp;amp;si=TpsxObheytQpIo6V" target="_blank" rel="noopener"&gt;Defender Experts Webinar Series&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;[1] References:&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://theevilbit.github.io/posts/macos_persistence_spotlight_importers/" target="_blank" rel="noopener"&gt;https://theevilbit.github.io/posts/macos_persistence_spotlight_importers/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.blackhat.com/docs/us-15/materials/us-15-Wardle-Writing-Bad-A-Malware-For-OS-X.pdf" target="_blank" rel="noopener"&gt;https://www.blackhat.com/docs/us-15/materials/us-15-Wardle-Writing-Bad-A-Malware-For-OS-X.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://newosxbook.com/home.html" target="_blank" rel="noopener"&gt;https://newosxbook.com/home.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2025/07/28/sploitlight-analyzing-a-spotlight-based-macos-tcc-vulnerability/?msockid=1d82efe462f761a000f9f9b2631f601a" target="_blank" rel="noopener"&gt;https://www.microsoft.com/en-us/security/blog/2025/07/28/sploitlight-analyzing-a-spotlight-based-macos-tcc-vulnerability/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 17:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/sploitlight-hunting-beyond-the-patch/ba-p/4463549</guid>
      <dc:creator>christinefossaceca</dc:creator>
      <dc:date>2025-11-13T17:00:00Z</dc:date>
    </item>
    <item>
      <title>The invisible attack surface: hunting AI threats in Defender XDR</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/the-invisible-attack-surface-hunting-ai-threats-in-defender-xdr/ba-p/4468195</link>
      <description>&lt;P&gt;As organizations embed AI across their business, the same technology that drives productivity also introduces a new class of risk: prompts that can be manipulated, data that can be leaked, and AI systems that can be tricked into doing things they shouldn’t. Attackers are already testing these boundaries, and defenders need visibility into how AI is being used - not just where it’s deployed.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.microsoft.com/security/business/cloud-security/microsoft-defender-cloud" target="_blank" rel="noopener"&gt;Microsoft Defender for Cloud&lt;/A&gt; now brings that visibility into the hunt. Its AI threat protection detects prompt injection, sensitive data exposure, and misuse of credentials in real time, correlating those signals with endpoint, identity, and cloud telemetry through &lt;A href="https://www.microsoft.com/security/business/siem-and-xdr/microsoft-defender-xdr" target="_blank" rel="noopener"&gt;Microsoft Defender XDR&lt;/A&gt;. The result is a single, searchable surface for investigating how both people and AI-driven systems behave under pressure.&lt;/P&gt;
&lt;P&gt;As of 2025, Defender for AI is fully integrated into Microsoft Defender for Cloud, extending protection to AI models, prompts, and datasets across Azure AI workloads. This makes Defender for Cloud the central platform for securing enterprise AI environments. Meanwhile, &lt;A href="https://www.microsoft.com/security/business/services/microsoft-defender-experts-xdr" target="_blank" rel="noopener"&gt;Microsoft Defender Experts&lt;/A&gt; continues expanding across Defender XDR, offering 24/7 human-led monitoring and investigation, with full active coverage for servers within Defender for Cloud today.&lt;/P&gt;
&lt;P&gt;For threat hunters, this evolution isn’t theoretical; it’s tactical. The same curiosity and precision that uncover lateral movement or data exfiltration now apply to AI misuse. In this post, we’ll walk through practical KQL hunts to surface suspicious AI activity, from abnormal model usage patterns to subtle signs of data exfiltration that traditional detections might miss.&lt;/P&gt;
&lt;H3&gt;The AI attack surface: old playbook, new players&lt;/H3&gt;
&lt;P&gt;Attackers aren’t reinventing the wheel; they’re repurposing it.&lt;U&gt; &lt;/U&gt;&lt;BR /&gt;The top risks map neatly to the OWASP Top 10 for LLM Applications:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Prompt &lt;U&gt;i&lt;/U&gt;njection (LLM01) – Manipulating model logic through crafted inputs or poisoned context&lt;/LI&gt;
&lt;LI&gt;Sensitive data disclosure (LLM06) – AI returning confidential data due to mis-scoped access&lt;/LI&gt;
&lt;LI&gt;Shadow AI usage – Employees using external copilots with corporate data&lt;/LI&gt;
&lt;LI&gt;Wallet abuse – API tokens or service principals driving massive, unintended consumption&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;It’s not about new telemetry; correlation is what matters.&amp;nbsp; Defender surfaces these risks by tying AI alerts from Defender for Cloud to real user behavior across your XDR environment.&lt;/P&gt;
&lt;H3&gt;Threat hunting: from AI alerts to insight&lt;/H3&gt;
&lt;P&gt;Forget slide decks. These are practical, production-ready hunting patterns using real Defender data tables.&lt;/P&gt;
&lt;H4&gt;1. Shadow AI&amp;nbsp;exfiltration detection&lt;/H4&gt;
&lt;P&gt;Office apps sending data to external AI endpoints (the #1 exfil path today).&lt;/P&gt;
&lt;LI-CODE lang=""&gt;(

    DeviceNetworkEvents

    | where RemoteUrl has_any (dynamic(["openai.com","anthropic.com","claude.ai","cohere.ai","chatgpt.com","gemini.google.com","huggingface.co","perplexity.ai"]))

    | where InitiatingProcessFileName in~ (dynamic(["EXCEL.EXE","WINWORD.EXE","OUTLOOK.EXE","POWERPNT.EXE","ONENOTE.EXE"]))

        or InitiatingProcessFileName in~ (dynamic(["chrome.exe","msedge.exe","firefox.exe","brave.exe"]))

    | extend Device = toupper(split(DeviceName, ".")[0]),

             IsOffice = InitiatingProcessFileName in~ (dynamic(["EXCEL.EXE","WINWORD.EXE","OUTLOOK.EXE","POWERPNT.EXE","ONENOTE.EXE"]))

    | summarize Connections = count(), IsOffice = max(IsOffice), AITime = max(Timestamp)

        by Device, User = InitiatingProcessAccountName

)

| join kind=inner (

    DeviceFileEvents

    | where ActionType in~ ("FileCopied","FileCreated","FileModified","FileRenamed")

    | extend Device = toupper(split(DeviceName, ".")[0]),

             Lower = tolower(strcat(FolderPath, FileName))

    | extend HeuristicFlag = case(

        Lower has_any ("password","credential","secret","api_key") or Lower endswith ".key" or Lower endswith ".pem", "Credential",

        Lower has_any ("confidential","restricted","classified","sensitive"), "Classified",

        Lower has_any ("ssn","salary","payroll"), "PII",

        Lower has_any ("finance","hr","legal","executive"), "OrgSensitive",

        "Other"

      ),

      LabelFlag = case(

        SensitivityLabel has "Highly Confidential", "Classified",

        SensitivityLabel has "Confidential", "Sensitive",

        SensitivityLabel has "Internal", "Internal",

        isnotempty(SensitivityLabel), "Labeled",

        "Unlabeled"

      )

    | where HeuristicFlag != "Other" or LabelFlag in ("Classified","Sensitive","Internal","Labeled")

    | summarize

          Files = count(),

          HeuristicCount = countif(HeuristicFlag != "Other"),

          DLPCount = countif(isnotempty(SensitivityLabel)),

          Types = make_set_if(HeuristicFlag, HeuristicFlag != "Other"),

          Labels = make_set_if(SensitivityLabel, isnotempty(SensitivityLabel)),

          FileTime = max(Timestamp)

        by Device, User = InitiatingProcessAccountName

) on Device, User

| extend Delta = datetime_diff('minute', AITime, FileTime)

| where abs(Delta) &amp;lt;= 240

| extend Priority = case(

    IsOffice == 1, "Critical",

    Labels has_any ("Highly Confidential","Confidential") or Types has "Credential" or Types has "Classified", "High",

    Files &amp;gt;= 20, "High",

    "Medium"

)

| project Priority, Device, User, Connections, Files, HeuristicCount, DLPCount, Types, Labels, Delta

| order by Priority desc, Files desc&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why it works:&lt;/STRONG&gt; Correlates outbound AI traffic with sensitive file access.&lt;BR /&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Block the key, review DLP coverage, fix workflow gaps.&lt;/P&gt;
&lt;H4&gt;2. Anomalous&amp;nbsp;consumption patterns&lt;/H4&gt;
&lt;P&gt;Off-hours Azure OpenAI activity isn’t necessarily productivity; it might be unsanctioned automation or exfiltration.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Azure OpenAI &amp;amp; LLM Off-Hours Detection - PER USER TIMEZONE

// DISCLAIMER: Time zone detection is approximate, based on behavioral inference.

// Validate per user/device when high-risk anomalies are flagged.

// If authoritative time zone data (e.g., Entra sign-in or mailbox settings) is available, prefer that source.

let MinRequestsThreshold = 500;

let MinTokensThreshold = 20000;

let OffHoursStart = 21;

let OffHoursEnd = 5;

let UserTimezones = CloudAppEvents

| where Timestamp &amp;gt; ago(60d)

| where Application has_any ("OpenAI", "Azure OpenAI", "ChatGPT", "Claude", "Gemini", "Anthropic", "Perplexity", "Microsoft 365 Copilot")

| extend HourUTC = datetime_part("Hour", Timestamp)

| summarize ActivityByHour = count() by AccountDisplayName, HourUTC

| summarize arg_max(ActivityByHour, HourUTC) by AccountDisplayName

| extend TimezoneOffset = iff((HourUTC - 14 + 24) % 24 &amp;gt; 12, (HourUTC - 14 + 24) % 24 - 24, (HourUTC - 14 + 24) % 24)

| project AccountDisplayName, TimezoneOffset;

CloudAppEvents

| where Timestamp &amp;gt; ago(30d)

| where Application has_any ("OpenAI", "Azure OpenAI", "ChatGPT", "Claude", "Gemini", "Anthropic", "Perplexity", "Microsoft 365 Copilot")

| extend

    HourUTC = datetime_part("Hour", Timestamp),

    DayUTC = toint(dayofweek(Timestamp)),

    Tokens = toint(RawEventData.totalTokens)

| join kind=leftouter (UserTimezones) on AccountDisplayName

| extend TZ = coalesce(TimezoneOffset, 0)

| extend HourLocal = (HourUTC + TZ + 24) % 24

| extend DayLocal = (DayUTC + iff(HourUTC + TZ &amp;gt;= 24, 1, iff(HourUTC + TZ &amp;lt; 0, -1, 0)) + 7) % 7

| extend IsAnomalous = (DayLocal in (0, 6)) or (HourLocal &amp;gt;= OffHoursStart or HourLocal &amp;lt; OffHoursEnd)

| where IsAnomalous

| extend IsWeekend = DayLocal in (0, 6), IsOffHours = HourLocal &amp;gt;= OffHoursStart or HourLocal &amp;lt; OffHoursEnd

| summarize

    Requests = count(),

    TokensUsed = sum(Tokens),

    WeekendRequests = countif(IsWeekend),

    LateNightRequests = countif(IsOffHours and not(IsWeekend)),

    LocalHours = make_set(HourLocal),

    LocalDays = make_set(DayLocal),

    Applications = make_set(Application),

    ActionTypes = make_set(ActionType),

    FirstSeen = min(Timestamp),

    LastSeen = max(Timestamp),

    DetectedTZ = any(TZ)

    by AccountDisplayName, IPAddress

| where Requests &amp;gt;= MinRequestsThreshold or TokensUsed &amp;gt;= MinTokensThreshold

| extend

    UserTimezone = case(

        DetectedTZ == 0, "UTC/GMT",

        DetectedTZ == -5, "EST (UTC-5)",

        DetectedTZ == -4, "EDT (UTC-4)",

        DetectedTZ == -6, "CST (UTC-6)",

        DetectedTZ == -7, "MST (UTC-7)",

        DetectedTZ == -8, "PST (UTC-8)",

        DetectedTZ == 1, "CET (UTC+1)",

        DetectedTZ == 8, "CST China (UTC+8)",

        DetectedTZ == 9, "JST Japan (UTC+9)",

        DetectedTZ &amp;gt; 0, strcat("UTC+", DetectedTZ),

        strcat("UTC", DetectedTZ)

    )

| extend

    ThreatPattern = case(

        array_length(Applications) &amp;gt; 1, "Multiple LLM Services",

        WeekendRequests &amp;gt; LateNightRequests * 2, "Weekend Automation",

        LateNightRequests &amp;gt; WeekendRequests * 2, "Late-Night Automation",

        Requests &amp;gt; 500, "High-Volume Script",

        "Unusual Off-Hours Activity"

    )

| extend

    RiskScore = case(

        Requests &amp;gt; 1000 and TokensUsed &amp;gt; 100000, 100,

        Requests &amp;gt; 500 and WeekendRequests &amp;gt; 100, 95,

        TokensUsed &amp;gt; 50000 or Requests &amp;gt; 200, 85,

        WeekendRequests &amp;gt; 100, 80,

        Requests &amp;gt; 100 or TokensUsed &amp;gt; 20000, 70,

        60

    )

| extend

    RiskLevel = case(

        RiskScore &amp;gt;= 90, "Critical",

        RiskScore &amp;gt;= 75, "High",

        RiskScore &amp;gt;= 60, "Medium",

        "Low"

    )

| project

    AccountDisplayName,

    IPAddress,

    RiskLevel,

    RiskScore,

    ThreatPattern,

    Requests,

    TokensUsed,

    WeekendRequests,

    LateNightRequests,

    Applications,

    UserTimezone,

    LocalHours,

    LocalDays,

    ActionTypes,

    FirstSeen,

    LastSeen

| sort by RiskScore desc, Requests desc&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why it works:&lt;/STRONG&gt; Humans sleep. Scripts don’t. Temporal anomalies expose automation faster than anomaly models.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Check grounding sources, confirm the IP, disable keys or service principals.&lt;/P&gt;
&lt;H4&gt;3. Bot-like behavior hunt&lt;/H4&gt;
&lt;P&gt;Highlights automation vs. compromise and early detection.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// ---- Tunables (adjust if needed) ----

let LookbackDays     = 7d;

let MinEvents        = 3;     // ignore trivial users

let RPM_AutoThresh   = 50.0;  // requests/hour threshold that smells like a bot

let MaxIPs_Auto      = 1;     // single IP suggests fixed worker

let MaxApps_Auto     = 1;     // single app suggests fixed worker

let MaxUAs_Auto      = 2;     // very few UAs over lookback

let MaxHighTokPct    = 5.0;   // % of requests over 4k tokens still considered benign



CloudAppEvents

| where Timestamp &amp;gt; ago(LookbackDays)

| where Application has_any ("OpenAI", "Azure OpenAI", "Microsoft 365 Copilot Chat")

| extend User = tolower(AccountDisplayName)

| extend raw = todynamic(RawEventData)

| extend Tokens = toint(coalesce(raw.totalTokens, raw.total_tokens, raw.usage_total_tokens))

| summarize

    TotalRequests     = count(),

    HighTokenRequests = countif(Tokens &amp;gt; 4000),

    AvgTokens         = avg(Tokens),

    MaxTokens         = max(Tokens),

    UniqueIPs         = dcount(IPAddress),

    IPs               = make_set(IPAddress, 50),

    UniqueApps        = dcount(Application),

    Apps              = make_set(Application, 20),

    UniqueUAs         = dcount(UserAgent),

    FirstRequest      = min(Timestamp),

    LastRequest       = max(Timestamp)

  by User

| where TotalRequests &amp;gt;= MinEvents

| extend _dur = toreal(datetime_diff('hour', LastRequest, FirstRequest))

| extend DurationHours = iif(_dur &amp;lt;= 0, 1.0, _dur)

| extend RequestsPerHour = TotalRequests / DurationHours

| extend HighTokenRatio  = (HighTokenRequests * 100.0) / TotalRequests

// ---- Heuristic: derive likely automation (no lists/regex) ----

| extend IsLikelyAutomation =

    (UniqueIPs &amp;lt;= MaxIPs_Auto and

     UniqueApps &amp;lt;= MaxApps_Auto and

     UniqueUAs  &amp;lt;= MaxUAs_Auto and

     RequestsPerHour &amp;gt;= RPM_AutoThresh and

     HighTokenRatio &amp;lt;= MaxHighTokPct)

// ---- Techniques &amp;amp; risk ----

| extend

    IsRapidFire    = RequestsPerHour &amp;gt; 20,

    IsHighVolume   = TotalRequests &amp;gt; 50,

    IsTokenAbuse   = HighTokenRatio &amp;gt; 30,

    IsMultiService = UniqueApps &amp;gt; 1,

    IsMultiIP      = UniqueIPs &amp;gt; 2,

    IsEscalating   = DurationHours &amp;lt; 24 and TotalRequests &amp;gt; 10

| where IsRapidFire or IsHighVolume or IsTokenAbuse or IsMultiService or IsMultiIP or IsEscalating

| extend TechniqueCount = toint(IsRapidFire) + toint(IsHighVolume) + toint(IsTokenAbuse) + toint(IsMultiService) + toint(IsMultiIP) + toint(IsEscalating)

| extend Risk = case(

    IsLikelyAutomation and UniqueIPs == 1 and UniqueApps == 1 and IsTokenAbuse == 0, "Low - Likely Automation",

    TechniqueCount &amp;gt;= 4, "Critical - Multi-Vector Behavior",

    TechniqueCount &amp;gt;= 3, "High - Attack Pattern",

    TechniqueCount &amp;gt;= 2, "Medium - Anomalous Behavior",

    "Low"

)

// Custom sort: Critical &amp;gt; High &amp;gt; Medium &amp;gt; Low - Likely Automation &amp;gt; Low

| extend RiskOrder = case(

    Risk startswith "Critical", 1,

    Risk startswith "High",     2,

    Risk startswith "Medium",   3,

    Risk == "Low - Likely Automation", 4,

    5

)

| project Risk, User, TotalRequests, RequestsPerHour, TechniqueCount, IsLikelyAutomation,

          IsRapidFire, IsHighVolume, IsTokenAbuse, IsMultiIP, IsMultiService, IsEscalating,

          UniqueIPs, IPs, UniqueApps, UniqueUAs, HighTokenRatio, DurationHours,

          FirstRequest, LastRequest, RiskOrder

| sort by RiskOrder asc, TotalRequests desc&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Why it works: &lt;/STRONG&gt;Hunting&lt;STRONG&gt; &lt;/STRONG&gt;automation-like patterns that could indicate either sanctioned scripts or early-stage compromise, enabling proactive detection before alerts fire.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Investigate flagged accounts immediately to confirm intent and mitigate potential AI misuse.&lt;/P&gt;
&lt;H3&gt;Operational lessons that scale beyond the lab&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;Custom &lt;U&gt;d&lt;/U&gt;etections &amp;gt; Ad hoc hunts – Turn query #1 into a scheduled detection. Shadow AI isn’t a one-off behavior.&lt;/LI&gt;
&lt;LI&gt;Security Copilot ≠ search bar – Use it for triage context, not hunting logic.&lt;/LI&gt;
&lt;LI&gt;Set quotas, treat them like controls – Token budgets and rate limits are as critical as firewalls for AI workloads.&lt;/LI&gt;
&lt;LI&gt;Defender for Cloud Apps&lt;U&gt; – &lt;/U&gt;Block risky generative AI apps while letting sanctioned copilots run.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Getting started with threat hunting for AI workloads&lt;/H3&gt;
&lt;P&gt;Before you run these hunts at scale, make sure your environment is instrumented for cognitive visibility. That means insight into how your AI models are being used and what data they reason over, not just how much compute they consume.&lt;/P&gt;
&lt;P&gt;Traditional telemetry shows process, network, and authentication events. Cognitive visibility adds prompts, model responses, grounding sources, and token behavior, giving analysts the context that explains why an AI acted the way it did.&lt;/P&gt;
&lt;P&gt;Defender for AI Services integrates with Defender for Cloud to provide that visibility layer, but the right configuration turns data collection into situational awareness.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Enable the AI services plan – Make sure Defender for AI Services is enabled at the subscription level. This activates continuous monitoring for Azure OpenAI, AI Foundry, and other managed AI workloads. &lt;A href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/ai-onboarding" target="_blank" rel="noopener"&gt;Microsoft Learn&lt;/A&gt; →&lt;/LI&gt;
&lt;LI&gt;Enable user prompt evidence – Turn on prompt capture for Defender for AI alerts. Seeing the exact input and model response during an attack is the difference between speculation and evidence. &lt;A href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/ai-onboarding" target="_blank" rel="noopener"&gt;Microsoft Learn&lt;/A&gt; →&lt;/LI&gt;
&lt;LI&gt;Validate your schema – Always test KQL queries in your workspace. Field names and event structures can differ across tenants and tiers, especially in CloudAuditEvents and AlertEvidence.&lt;/LI&gt;
&lt;LI&gt;Use Security Copilot for&amp;nbsp;acceleration – Let Copilot translate natural language hypotheses into KQL, then fine-tune the logic yourself. It is the fastest way to scale your hunts without losing precision. &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-security-copilot" target="_blank" rel="noopener"&gt;Microsoft Learn&lt;/A&gt; →&lt;/LI&gt;
&lt;LI&gt;Monitor both sides of the equation – Hunt for both AI-specific risks such as prompt injection, model abuse, or token sprawl, and traditional threats that target AI systems such as compromised credentials, exposed storage, or lateral movement through service principals.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Visibility is only as strong as the context you capture. The sooner you enable these settings, the sooner your SOC can understand why your models behave the way they do, not just what they did.&lt;/P&gt;
&lt;H3&gt;Final thoughts: from prompts to protections&lt;/H3&gt;
&lt;P&gt;As AI becomes part of core infrastructure, its telemetry must become part of your SOC’s muscle memory. The same principles that power endpoint or identity defense (i.e. visibility, correlation, anomaly detection) now apply to model inference, token usage, and data grounding.&lt;/P&gt;
&lt;P&gt;Defender for Cloud and Defender XDR give you that continuity: alerts flow where your analysts already work, and your hunting logic evolves without a separate stack.&lt;/P&gt;
&lt;P&gt;Protecting AI isn’t about chasing every model. It’s about extending proven security discipline to the systems that now think alongside you.&lt;/P&gt;
&lt;H3&gt;Further Reading&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/ai-threat-protection%22%20/t%20%22_new" target="_blank" rel="noopener"&gt;Defender for Cloud AI Threat Protection&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/ai-threat-protection%22%20/t%20%22_new%22HYPERLINK%20%22https:/learn.microsoft.com/en-us/defender-xdr/advanced-hunting-overview%22%20/t%20%22_new" target="_blank" rel="noopener"&gt;Advanced Hunting in Microsoft Defender XDR&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-overview%22%20/t%20%22_new%22HYPERLINK%20%22https:/owasp.org/www-project-top-10-for-large-language-model-applications/%22%20/t%20%22_new" target="_blank" rel="noopener"&gt;OWASP Top 10 for LLM Applications&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Found a better pattern? Post it. The threat surface is new, but the hunt discipline isn’t.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 17:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/the-invisible-attack-surface-hunting-ai-threats-in-defender-xdr/ba-p/4468195</guid>
      <dc:creator>Raae_</dc:creator>
      <dc:date>2025-11-11T17:00:00Z</dc:date>
    </item>
    <item>
      <title>Delivering more threat hunting insights with Microsoft Defender Experts’ newest capabilities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/delivering-more-threat-hunting-insights-with-microsoft-defender/ba-p/4466047</link>
      <description>&lt;P&gt;The cybersecurity threat landscape continues to evolve with novel attacks and techniques emerging each day. &lt;A href="https://www.microsoft.com/security/business/services/microsoft-defender-experts-hunting" target="_blank" rel="noopener"&gt;Microsoft Defender Experts for Hunting&lt;/A&gt;, included with &lt;A href="https://www.microsoft.com/security/business/services/microsoft-defender-experts-xdr" target="_blank" rel="noopener"&gt;Microsoft Defender Experts for XDR&lt;/A&gt;, helps security teams stay ahead of evolving attacks by providing proactive threat hunting, powered by Microsoft’s vast threat intelligence with 100 trillion daily signals processed by over 10,000 experts. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;To date, our managed threat hunting reports have provided details about the hunts we conduct after observing suspicious activity, with full attack summary details provided for verified threats (also known as Defender Experts Notifications). Today, we are excited to announce the general availability of new capabilities that deliver deeper hunting context to our customers. More specifically, we will provide greater insight into each hunt we carry out—not just the ones that result in verified threats. And we’ll also give our customers visibility into the hypothesis-based hunts we conduct on their behalf.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Introducing investigation summaries for the hunts we conduct&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Each hunt we conduct tells a story, even when no active threat is found. So, to keep you informed, you will now receive an investigation summary to go along with nearly each hunt we conduct in their environment—regardless of whether a confirmed threat was found. This summary will detail what we hunted for, why we hunted for it, and how we reached our final determination.&lt;/P&gt;
&lt;P&gt;Beyond transparency, these summaries provide assurance that we thoroughly hunted down the threat and that your defenses remain intact. They help validate your security posture and, when applicable, highlight any previously uncovered threats during the process. Even in cases where no threat is detected, you can analyze our hunt summaries to be tangibly assured that we are continuously hunting on your behalf—keeping you informed, prepared, and ahead of new risks.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 1. Screenshot of Microsoft Defender Experts for Hunting report with hunts mapped to threat categories.&lt;/EM&gt;&lt;/img&gt;&lt;img&gt;&lt;EM&gt;Figure 2. Screenshot of the Hunting report, showing the new investigation summary feature after a user clicks into a hunt.&lt;/EM&gt;&lt;/img&gt;
&lt;H5&gt;&lt;STRONG&gt;New Emerging threats section of the Defender Experts for Hunting report&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Our threat hunters constantly analyze substantial amounts of threat intelligence to hunt for new and emerging techniques. To share this information with you, we are unveiling a new section of our report titled “Emerging threats” which details the proactive, hypothesis-based hunts we’ve conducted in your environment. These hunts focus on tactics that adversaries are just beginning to adopt, meaning they might bypass traditional detection mechanisms.&lt;/P&gt;
&lt;P&gt;This section will provide a title briefly describing each emerging threat, the severity we’ve ascribed to it, its relevant threat category, and most importantly, whether we’ve identified any evidence of impact in your environment. Additionally, by clicking into the hunt, you’ll see when we started and ended our hunt for the threat, along with a full investigation summary detailing our hunt. By surfacing these emerging threat hunts, we give you visibility into how we’re anticipating attacker behavior, validating your defenses against cutting-edge techniques, and identifying relevant suspicious activity before significant exploitation.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 3. Screenshot of the Defender Experts for Hunting report’s new Emerging threats section.&lt;/EM&gt;&lt;/img&gt;&lt;img&gt;&lt;EM&gt;Figure 4. Screenshot of the Hunting report after a user clicks into an emerging threat hunt.&lt;/EM&gt;&lt;/img&gt;
&lt;H5&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;With these new capabilities, Microsoft Defender Experts for Hunting goes beyond detection to deliver transparency, assurance, and proactive defense. By surfacing investigation summaries and emerging threat insights, we help security teams validate their defenses, anticipate attacker tactics, and stay ahead of evolving risks. You can access these new capabilities by visiting your Hunting report, located in the Defender portal.&lt;/P&gt;
&lt;P&gt;To &lt;A href="https://aka.ms/IWantDefenderExperts" target="_blank" rel="noopener"&gt;learn more&lt;/A&gt; about our hunting service, visit our &lt;A href="https://www.microsoft.com/en-us/security/business/services/microsoft-defender-experts-hunting" target="_blank" rel="noopener"&gt;Microsoft Defender Experts for Hunting page&lt;/A&gt;, read &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/defender-experts-for-hunting" target="_blank" rel="noopener"&gt;our hunting documentation&lt;/A&gt;, or watch our &lt;A href="https://www.youtube.com/watch?v=iqlxXf6JeQg" target="_blank" rel="noopener"&gt;explainer video&lt;/A&gt;. To learn more about our managed XDR service, visit our &lt;A href="https://www.microsoft.com/en-us/security/business/services/microsoft-defender-experts-xdr" target="_blank" rel="noopener"&gt;Microsoft Defender Experts for XDR page&lt;/A&gt;, or read our &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/dex-xdr-overview" target="_blank" rel="noopener"&gt;XDR documentation&lt;/A&gt;. You can also visit our &lt;A href="https://techcommunity.microsoft.com/t5/microsoft-security-experts/bd-p/MicrosoftSecurityExpertsDiscussionSpace" target="_blank" rel="noopener"&gt;Tech Community discussion space&lt;/A&gt; to ask questions, engage in conversations, and share your expertise and feedback.&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;What's next?&amp;nbsp;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;Join us at&amp;nbsp;&lt;A href="https://aka.ms/Ignite/SecurityPage" target="_blank" rel="noopener"&gt;Microsoft Ignite&lt;/A&gt;&amp;nbsp;in San Francisco on November 17–21, or online, November 18–20&lt;/STRONG&gt;, for deep dives and practical labs to help you maximize your Microsoft Defender investments and to get more from the Microsoft capabilities you already use. Security is a core focus at&amp;nbsp;Ignite this year, with the Security Forum on November 17th, deep dive technical sessions, theater talks, and hands-on labs designed for security leaders and practitioners&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Featured sessions&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;BRK237: Identity Under Siege: Modern ITDR from Microsoft&lt;BR /&gt;&lt;/STRONG&gt;Join experts in Identity and Security to hear how Microsoft is streamlining collaboration across teams and helping customers better protect, detect, and respond to threats targeting your identity fabric.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;BRK240&lt;/STRONG&gt;&amp;nbsp;–&amp;nbsp;&lt;STRONG&gt;Endpoint security in the AI era: What's new in Defender&lt;/STRONG&gt;&lt;BR /&gt;Discover how Microsoft Defender’s AI-powered endpoint security empowers you to do more, better, faster.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;BRK236&lt;/STRONG&gt;&amp;nbsp;–&lt;STRONG&gt;&amp;nbsp;Your SOC’s ally against cyber threats, Microsoft Defender Experts&lt;/STRONG&gt;&lt;BR /&gt;See how Defender Experts detect, halt, and manage threats for you, with real-world outcomes and demos.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;LAB541&lt;/STRONG&gt;&amp;nbsp;–&lt;STRONG&gt;&amp;nbsp;Defend against threats with Microsoft Defender&lt;/STRONG&gt;&lt;BR /&gt;Get hands-on with Defender for Office 365 and Defender for Endpoint, from onboarding devices to advanced attack mitigation.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Explore and filter the full security catalog by topic, format, and role:&amp;nbsp;&lt;A href="http://aka.ms/SessionCatalogSecurity" target="_blank" rel="noopener"&gt;aka.ms/SessionCatalogSecurity&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why attend?&lt;/STRONG&gt;&lt;BR /&gt;&lt;A class="lia-external-url" href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fignite.microsoft.com%2Fen-US%2Fhome&amp;amp;data=05%7C02%7Cv-smithemi%40microsoft.com%7C0614cce7aec6428af77e08de165ff9de%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638972798695802854%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=Bkf3%2Fbj%2F3e2Cf6sA01x%2BHSphpfcJKK2OXXOaWYOP1Aw%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Ignite&lt;/A&gt; is the place to learn about the latest Defender capabilities, including new agentic AI integrations and unified threat protection. We will also share future-facing innovations in Defender, as part of our ongoing commitment to autonomous defense.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Security Forum—Make day 0 count (November 17)&lt;/STRONG&gt;&lt;BR /&gt;Kick off with an immersive, in person preday focused on strategic security discussions and real-world guidance from Microsoft leaders and industry experts. Select Security Forum during registration.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/MSIgnite_Blog_Security2_3" target="_blank" rel="noopener"&gt;Register for Microsoft Ignite &amp;gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Nov 2025 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/delivering-more-threat-hunting-insights-with-microsoft-defender/ba-p/4466047</guid>
      <dc:creator>DillonPersaud</dc:creator>
      <dc:date>2025-11-03T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Cloud shadows: How attackers exploit Azure’s elasticity for stealth and scale</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/cloud-shadows-how-attackers-exploit-azure-s-elasticity-for/ba-p/4463551</link>
      <description>&lt;P&gt;Threats like password spray or adversary-in-the-middle (AiTM) are routine and too easily overlooked in an endless stream of security alerts. But what if these routine threats are only a small part of a much deeper, more sophisticated attack?&lt;/P&gt;
&lt;P&gt;Since June 2025, Microsoft Defender Experts has been closely monitoring a sophisticated and continuously evolving attack campaign targeting poorly managed Azure cloud environments. What sets these threats apart is their use of Azure’s elasticity and interconnected structure, which allows users and attackers alike to move more easily through multi-tenant environments and avoid basic detection. By specifically targeting&amp;nbsp;student and Pay-As-You-Go accounts that are improperly secured and poorly monitored, adversaries can rapidly move across tenants, weaponize ephemeral resources, and manipulate quotas—constructing a resilient and dynamic ecosystem. Their methods blend so seamlessly with legitimate cloud activity that they frequently evade basic threat detection methods, taking full advantage of trusted cloud features to ensure persistence and scale.&lt;/P&gt;
&lt;P&gt;The&amp;nbsp;campaigns demonstrate how today’s adversaries can transform even a single compromised credential into a sprawling and complex attack across multiple tenants.&lt;/P&gt;
&lt;P&gt;Attackers no longer simply establish static footholds; instead, every compromised account becomes a possible springboard, every tenant a new beachhead. Their arsenal is thoroughly cloud-native: rapidly deploying short-lived virtual machines, registering OAuth applications for ongoing access, manipulating service quotas to expand their attack infrastructure, and abusing machine learning workspaces for covert activity. The result is an attack ecosystem that’s agile, elusive, and built to endure in the fast-moving world of the cloud.&lt;/P&gt;
&lt;H5&gt;Why are these attacks worth watching?&lt;/H5&gt;
&lt;P&gt;These attacks&lt;STRONG&gt; &lt;/STRONG&gt;represent a strategic evolution in threat actor behavior—blending into legitimate cloud activity, evading traditional detection, and exploiting the very features that drive business agility. The scale, adaptability, and persistence demonstrated in this campaign is a wake-up call: defenders must look beyond the surface, understand the full lifecycle of cloud-native attacks, and be prepared to counter adversaries who are already mastering the art of stealth and scale.&lt;/P&gt;
&lt;P&gt;This blog doesn’t just recount what happened, it breaks down the anatomy of a cloud-scale attack. Whether you're a security analyst, cloud architect, or threat hunter, the goal is to help you recognize the signs, understand the methods, and prepare your defenses. With the cloud, organizations benefit from scale, global access, and agility. But if not properly secured, those attributes also benefit threat actors.&lt;/P&gt;
&lt;H1&gt;Resource development: exploiting the weakest links&lt;/H1&gt;
&lt;P&gt;Microsoft Defender Experts has observed ongoing, large-scale campaigns on Azure environments. Student and Pay-As-You-Go (PAYG) accounts, were exploited due to poor security hygiene. These accounts often lacked essential protections: weak or default passwords, no multi-factor authentication (MFA), and no active security monitoring or Defender for Cloud subscription.&lt;/P&gt;
&lt;P&gt;Initial access was achieved via adversary in the middle (AiTM) attacks or password sprays against Azure User Profile Application (UPA) accounts, commonly using infrastructure hosted by M247 Europe SRL &amp;amp; LTD (New York) and Latitude.&lt;/P&gt;
&lt;H2&gt;Weaponizing ephemeral infrastructure&lt;/H2&gt;
&lt;P&gt;Once access was established using a compromised account, the attacker created new Resource Groups and deployed short-lived Virtual Machines (VMs). These VMs ran for as little as 3–4 hours and up to 1–2 days before being deleted. This approach enabled rapid rotation of attack infrastructure, minimal forensic footprint, and evasion of long-term detection.&lt;/P&gt;
&lt;P&gt;From these ephemeral VMs, large-scale password spray attacks were launched (predominantly utilizing user agents—BAV2ROPC, python-requests/2.32.3, python-requests/2.32.4) against thousands of accounts across multiple Azure tenants. Operating within Azure’s ecosystem helped the campaign stay below conventional alerting thresholds. Alerts that did occur were often dismissed as false positives or benign because they originated from legitimate Azure associated IP addresses.&lt;/P&gt;
&lt;H2&gt;Scaling through multi-hop and multitenant techniques&lt;/H2&gt;
&lt;P&gt;The sophistication of this campaign lies in their &lt;STRONG&gt;multi-hop&lt;/STRONG&gt; and &lt;STRONG&gt;multitenant&lt;/STRONG&gt; architecture:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Multi-hop&lt;/STRONG&gt;: Attacker used compromised Azure VMs to pivot and launch attacks on other accounts, masking their origin and complicating attribution.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Multitenant&lt;/STRONG&gt;: By controlling multiple Azure tenants, attackers distribute their operations, scale attacks, and maintain resilience against takedowns.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This cross-tenant movement within the Azure environment allows attackers to expand their footprint more easily, making&amp;nbsp;detection more challenging.&lt;/P&gt;
&lt;H1&gt;Impact: spam, financial fraud, phishing, and sextortion campaigns&lt;/H1&gt;
&lt;P&gt;Following each successful password spray attack, the campaign expanded across compromised Azure tenants. Using access gained from earlier stages, the attacker repurposed virtual machines within these tenants to send large volumes of phishing and scam emails.&lt;/P&gt;
&lt;P&gt;These phishing campaigns were carefully crafted to deceive users in compromised tenants, often leading to financial fraud involving URL shorteners like rebrand.ly, redirecting victims to fraudulent non-work related websites such as those with personal interest, entertainment, or leisure activity content.&lt;/P&gt;
&lt;P&gt;On those fake sites, users were prompted to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Complete surveys or questionnaires&lt;/LI&gt;
&lt;LI&gt;Provide personal information&lt;/LI&gt;
&lt;LI&gt;Download malicious Android APKs such as FM WhatsApp or Yo WhatsApp&lt;/LI&gt;
&lt;/UL&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;Note:&lt;/EM&gt; The APK is a resigned WhatsApp clone trojan that exploits elevated WhatsApp permissions to harvest private data (contacts, files) while mimicking legitimate registration by communicating with official servers to evade detection. Its malicious actions are triggered via commands hosted in a compromised GitHub repo (xiaoqaingkeke/Stat), indicating a GitHub based C2.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;In some cases, victims were lured to enter their mobile numbers for chat services or install additional video calling apps—further expanding the attacker’s reach and enabling data harvesting and even extortion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H1&gt;Persistence and expansion&lt;/H1&gt;
&lt;P&gt;Privileged access and the infrastructure the attacker compromised, built, and used in this campaign are worthless if the attacker cannot maintain control. To maintain and strengthen their foothold, the adversary deployed multiple persistence mechanisms. Below is a summary of the persistence techniques used by the attacker, as observed by Microsoft Defender experts across compromised tenants during the investigation.&lt;/P&gt;
&lt;H2&gt;Abuse of OAuth applications&lt;/H2&gt;
&lt;P&gt;Once access to an Azure tenant was obtained, the campaign escalated by registering OAuth applications. Two distinct types of applications were observed:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure CLI–themed &lt;/STRONG&gt;apps (named like "Azure-CLI-2025-06-DD-HH-MM-SS" and "Azure CLI") were registered with the compromised tenant as owner. The attacker added password credentials and created service principals for these apps to enable persistent backdoors (even attempted to re-enable a disabled subscription). In one instance, two custom Azure CLI apps were used to authenticate to Azure Databricks so access would survive account disables.&lt;/LI&gt;
&lt;LI&gt;The attacker registered a malicious custom application named&lt;STRONG&gt; MyNewApp&lt;/STRONG&gt;, which was used to send large volumes of phishing emails and was successfully traced the campaign by analysing Microsoft Graph API calls, which revealed delivery and engagement patterns&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Quota manipulation&lt;/H2&gt;
&lt;P&gt;To amplify the campaign’s infrastructure, the attacker exploited compromised credentials to submit service tickets requesting quota increases for Azure VM families:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A request was made to raise the quota for the DaV4 VM family to 960 cores across multiple regions.&lt;/LI&gt;
&lt;LI&gt;A guest account, added during the attack, submitted a similar request for the EIADSv5 VM family.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These actions reflect a deliberate effort to scale up the virtual machine farm, enabling broader password spray operations and phishing campaigns.&lt;/P&gt;
&lt;P&gt;Notably, the VM farm created by the compromised user was dismantled within three hours, while the farm initiated by the guest account remained active for a full day. This highlights the risk of guest access persistence, which often remains unless explicitly revoked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H1&gt;Advanced abuse in Azure: ML workspaces, Key Vaults, and beyond&lt;/H1&gt;
&lt;P&gt;The recent campaign against a poorly managed, monitored, and configurated Azure environment was marked by a sophisticated, multi-stage attack that leveraged the elasticity and trusted features of cloud-native infrastructures for stealth and scale. The attacker’s operations were not limited to simple credential theft or cross-tenant movement—they demonstrated advanced abuse of Azure’s Machine Learning (ML) services, notebook proxies, Key Vaults, and blob storage to automate, persist, and exfiltrate at scale.&lt;/P&gt;
&lt;H2&gt;ML workspaces and notebook proxies: a stealthy execution layer&lt;/H2&gt;
&lt;P&gt;The attacker repeatedly created Machine Learning workspaces (Microsoft.MachineLearningServices/workspaces/write) and deployed notebook proxies (Microsoft.Notebooks/NotebookProxies/write) using both compromised user accounts and invited guest identities.&lt;/P&gt;
&lt;P&gt;Attackers can abuse Azure ML to run cryptominers or malicious jobs disguised as training, poison or deploy compromised models, use workspaces/notebooks for persistent RCE, and exfiltrate data via linked storage. They scale with automated pipelines and quota requests, all while blending into normal AI workflows to evade detection.&lt;/P&gt;
&lt;H2&gt;Blob storage exploitation: payload staging and data exfiltration&lt;/H2&gt;
&lt;P&gt;Simultaneously, the attacker provisioned &lt;STRONG&gt;blob storage containers&lt;/STRONG&gt; (Microsoft.Storage/storageAccounts/blobServices/containers/write) to stage payloads, host malicious scripts, and store sensitive datasets. The global accessibility and high availability of blob storage made it an ideal channel for covert data exfiltration and operational agility, minimizing the likelihood of detection.&lt;/P&gt;
&lt;H2&gt;Key Vault manipulation: securing persistence&lt;/H2&gt;
&lt;P&gt;The creation and modification of Key Vaults (Microsoft.KeyVault/vaults/write) suggests a deliberate effort to store secrets, credentials, and access tokens. That allowed the attacker to automate interactions with other Azure services and maintain long-term persistence. By embedding themselves into the fabric of cloud identity and access management, they ensured continued access even if initial entry points were remediated.&lt;/P&gt;
&lt;H1&gt;Damage statistics from the campaign controlled by single attacker machine&lt;/H1&gt;
&lt;P&gt;The impact? Staggering. In a matter of days, a single attacker machine was able to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Target nearly 1.9 million global users and compromise over 51,000 accounts.&lt;/LI&gt;
&lt;LI&gt;Infiltrate 35 Azure tenants and abuse 36 subscriptions.&lt;/LI&gt;
&lt;LI&gt;Spin up 154 virtual machines with 86 used specifically for password spray attacks.&lt;/LI&gt;
&lt;LI&gt;Raise over 800,000 Defender alerts, flooding security teams and masking true malicious activity.&lt;/LI&gt;
&lt;LI&gt;Send 2.6million spam emails.&lt;/LI&gt;
&lt;LI&gt;Abuse Azure’s machine learning services, register malicious OAuth apps, and manipulate quotas to scale up attacks—all while maintaining persistence and evading detection.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Recommendations&lt;/H1&gt;
&lt;UL&gt;
&lt;LI&gt;Harden identity to prevent attackers from exploiting low-hanging student subscriptions.&lt;/LI&gt;
&lt;LI&gt;Enforce&amp;nbsp;MFAand&amp;nbsp;password protection as most of the users often don't enroll in MFA. Investigate and auto remediate&amp;nbsp;risky users/sign ins; enable&amp;nbsp;token protection&amp;nbsp;(where available) to reduce the blast radius of stolen cookies. Microsoft’s public AiTM guidance consolidates these defenses, and XDR’s AiTM disruption revokes cookies and disables users during active compromise.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Constrain abuse pathways in Azure.&lt;/LI&gt;
&lt;LI&gt;Apply least privilege RBAC, review guest invitations, and monitor for role promotions on a schedule and via near Realtime analytics, as outlined in Microsoft’s subscription compromise post.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Watch for subscription directory/transfer changes and couple with approval style processes; remember transfer can move management (and thus logs) while billing may not change by default.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Treat quota as a credit limit and instrument alerts for &lt;EM&gt;large&lt;/EM&gt;, &lt;EM&gt;fast&lt;/EM&gt;, or &lt;EM&gt;multiregion&lt;/EM&gt; quota consumption to spot bursts (legitimate or not). Microsoft’s ML quota docs explain defaults, VM family splits (e.g., “Nseries” GPUs default to zero), and how to request increases.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;If you suspect your subscription is being misused&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Start an investigation using Microsoft’s playbooks (password spray) and the hunting queries below; prioritize containment of accounts with risky sign ins and recent ARM writes.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;If you’re a CSP partner, subscribe to Unauthorized Party Abuse (UPA) alerts and follow the documented response steps for compromised Azure subscriptions. These alerts help surface anomalous consumption and abuse earlier.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Clean up tenants/subscriptions you don’t need and understand transfer/cancellation mechanics (“Protect tenants and subscriptions from abuse and fraud attacks”). This both reduces your attack surface and simplifies response.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Report abuse (e.g., spam, DoS, brute force, malware) observed from Azure IPs or URLs via the MSRC reporting portal; this ensures the platform teams can act on infra being used against others.&lt;img /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H1&gt;A practical hunting mini playbook&lt;/H1&gt;
&lt;P&gt;&lt;STRONG&gt;1) Azure resource writes, role assignments, etc (last 24h) from high-risk sign-in accounts.&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang=""&gt; let RiskySignin = SigninLogs 

| where TimeGenerated &amp;gt; ago(24h) 

| where RiskLevelAggregated == "high"  

| project RiskTime = TimeGenerated, UserPrincipalName, IPAddress; 

AzureActivity 

| where TimeGenerated &amp;gt; ago(24h) 

| where OperationNameValue has_any ( 

      "Microsoft.MachineLearningServices/workspaces/write", 

      "Microsoft.MachineLearningServices/workspaces/computes/write", 

      "Microsoft.Compute/virtualMachines/extensions/write", 

      "Microsoft.Authorization/roleAssignments/write", 

      "Microsoft.Resources/subscriptions/resourceGroups/write", 

      // Optional: include the VM create/update itself (not just extensions) 

      "Microsoft.Compute/virtualMachines/write" 

   ) 

   or (ActivityStatusValue == "Success" 

       and OperationNameValue == "Microsoft.Subscription/aliases/write") 

| extend CallerIP = coalesce(CallerIpAddress, tostring(parse_json(Properties).callerIpAddress)) 

| join kind=inner (RiskySignin) on $left.Caller == $right.UserPrincipalName 

| where TimeGenerated between (RiskTime .. RiskTime + 2h) 

| summarize Ops = count(), DistinctOps = dcount(OperationNameValue) 

          by Caller, CallerIP, bin(TimeGenerated, 30m) 

| order by Ops desc &lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2) Azure Activity (Sentinel): Support ticket creation before ML service deployment for Quota abuse&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;//Below query shows the risky users writing support tickets which involve quota increase 

let RiskySignin = SigninLogs 

| where TimeGenerated &amp;gt; ago(24h) 

| where RiskLevelAggregated == "high"  

| project RiskTime = TimeGenerated, UserPrincipalName, IPAddress; 

AzureActivity 

| where TimeGenerated &amp;gt; ago(24h) 

| where OperationNameValue has_any ("supportTickets/write","usages/write") 

| project QuotaTime = TimeGenerated, Caller, CallerIpAddress = tostring(parse_json(Properties).callerIpAddress) 

| join kind=inner (RiskySignin) on $left.Caller == $right.UserPrincipalName 

| where QuotaTime between (RiskTime .. RiskTime + 2h) &lt;/LI-CODE&gt;
&lt;H1&gt;In conclusion&lt;/H1&gt;
&lt;P&gt;The cloud offers organizations many important benefits.&amp;nbsp; Unfortunately, threat actors are leveraging cloud attributes such as elasticity, scale, and interconnectedness to orchestrate persistent, multitenant attacks that evade traditional defenses. As demonstrated, even a single compromised account can rapidly escalate into a widespread attack, affecting thousands of users and tenants.&lt;/P&gt;
&lt;P&gt;To counter those evolving threats, defenders must adopt proactive measures: enforce strong identity controls, monitor for suspicious activity, limit privileges, and regularly audit cloud resources. Ultimately, maintaining vigilance and adapting security practices to the dynamic nature of cloud environments, such as Azure, is essential to protect against increasingly stealthy and scalable adversaries and making your cloud more secure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;What's next?&amp;nbsp;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Join us at&amp;nbsp;&lt;A href="https://aka.ms/Ignite/SecurityPage" target="_blank" rel="noopener"&gt;Microsoft Ignite&lt;/A&gt;&amp;nbsp;in San Francisco on November 17–21, or online, November 18–20&lt;/STRONG&gt;, for deep dives and practical labs to help you maximize your Microsoft Defender investments and to get more from the Microsoft capabilities you already use. Security is a core focus at&amp;nbsp;Ignite this year, with the Security Forum on November 17th, deep dive technical sessions, theater talks, and hands-on labs designed for security leaders and practitioners&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Featured sessions&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;BRK237: Identity Under Siege: Modern ITDR from Microsoft&lt;BR /&gt;&lt;/STRONG&gt;Join experts in Identity and Security to hear how Microsoft is streamlining collaboration across teams and helping customers better protect, detect, and respond to threats targeting your identity fabric.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;BRK240&lt;/STRONG&gt;&amp;nbsp;–&amp;nbsp;&lt;STRONG&gt;Endpoint security in the AI era: What's new in Defender&lt;/STRONG&gt;&lt;BR /&gt;Discover how Microsoft Defender’s AI-powered endpoint security empowers you to do more, better, faster.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;BRK236&lt;/STRONG&gt;&amp;nbsp;–&lt;STRONG&gt;&amp;nbsp;Your SOC’s ally against cyber threats, Microsoft Defender Experts&lt;/STRONG&gt;&lt;BR /&gt;See how Defender Experts detect, halt, and manage threats for you, with real-world outcomes and demos.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;LAB541&lt;/STRONG&gt;&amp;nbsp;–&lt;STRONG&gt;&amp;nbsp;Defend against threats with Microsoft Defender&lt;/STRONG&gt;&lt;BR /&gt;Get hands-on with Defender for Office 365 and Defender for Endpoint, from onboarding devices to advanced attack mitigation.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Explore and filter the full security catalog by topic, format, and role:&amp;nbsp;&lt;A href="http://aka.ms/SessionCatalogSecurity" target="_blank" rel="noopener"&gt;aka.ms/SessionCatalogSecurity&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why attend?&lt;/STRONG&gt;&lt;BR /&gt;Ignite is the place to learn about the latest Defender capabilities, including new agentic AI integrations and unified threat protection. We will also share future-facing innovations in Defender, as part of our ongoing commitment to autonomous defense.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Security Forum—Make day 0 count (November 17)&lt;/STRONG&gt;&lt;BR /&gt;Kick off with an immersive, in person preday focused on strategic security discussions and real-world guidance from Microsoft leaders and industry experts. Select Security Forum during registration.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/MSIgnite_Blog_Security2_3" target="_blank" rel="noopener"&gt;Register for Microsoft Ignite &amp;gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Oct 2025 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/cloud-shadows-how-attackers-exploit-azure-s-elasticity-for/ba-p/4463551</guid>
      <dc:creator>Pranavahebbar</dc:creator>
      <dc:date>2025-10-27T15:00:00Z</dc:date>
    </item>
    <item>
      <title>How Microsoft Defender Experts and partners like Quorum Cyber are redefining cybersecurity teamwork</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/how-microsoft-defender-experts-and-partners-like-quorum-cyber/ba-p/4452639</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In today’s rapidly evolving threat landscape, cybersecurity demands more than just great technology—it requires great teamwork. That’s the story behind the collaboration between &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/business/services/microsoft-defender-experts-xdr" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Defender Experts&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; and M&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;X&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;DR partner, &lt;/SPAN&gt;&lt;A href="https://www.quorumcyber.com/insights/quorum-cyber-is-now-a-microsoft-solutions-partner-for-security/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Quorum Cyber&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, joining forces to deliver end-to-end threat protection for organizations worldwide.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Microsoft&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;-v&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;erified &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;MXDR&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 2"&gt;p&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;artner&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Defender Experts recognized the need for partner-led managed services to complement their first-party MDR (Managed Detection and Response) service.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Quorum Cyber is a trusted Microsoft solutions partner and MSSP of the Year. They are also a &lt;/SPAN&gt;&lt;A href="https://cloudpartners.transform.microsoft.com/mxdrpartners" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;-v&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;erified &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;MDR&lt;/SPAN&gt; &lt;SPAN data-ccp-charstyle="Hyperlink"&gt;p&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;artner&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, which means they passed Microsoft’s validation process to deliver services using Microsoft’s security technologies. Quorum Cyber complements Microsoft Defender Experts, MDR services with additional security operations center (SOC) capabilities, extended coverage, non-Microsoft telemetry, and 3&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-fontsize="11"&gt;rd&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; party domain expertise.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1" data-ccp-parastyle-defn="{&amp;quot;ObjectId&amp;quot;:&amp;quot;3a3a8cea-411c-59e1-8daa-e9f3e777a425|1&amp;quot;,&amp;quot;ClassId&amp;quot;:1073872969,&amp;quot;Properties&amp;quot;:[201342446,&amp;quot;1&amp;quot;,201342447,&amp;quot;5&amp;quot;,201342448,&amp;quot;3&amp;quot;,201342449,&amp;quot;1&amp;quot;,469777841,&amp;quot;Cambria&amp;quot;,469777842,&amp;quot;Arial&amp;quot;,469777843,&amp;quot;ＭＳ 明朝&amp;quot;,469777844,&amp;quot;Cambria&amp;quot;,201341986,&amp;quot;1&amp;quot;,469769226,&amp;quot;Cambria,Arial,ＭＳ 明朝&amp;quot;,268442635,&amp;quot;22&amp;quot;,469775450,&amp;quot;Quote1&amp;quot;,201340122,&amp;quot;2&amp;quot;,134234082,&amp;quot;true&amp;quot;,134233614,&amp;quot;true&amp;quot;,469778129,&amp;quot;Quote1&amp;quot;,335572020,&amp;quot;1&amp;quot;,134224901,&amp;quot;true&amp;quot;,335559685,&amp;quot;360&amp;quot;,469777929,&amp;quot;Quote1 Char&amp;quot;,469778324,&amp;quot;Normal&amp;quot;]}" data-ccp-parastyle-linked-defn="{&amp;quot;ObjectId&amp;quot;:&amp;quot;a6ca5aa9-7727-52ac-a537-2e5060d5ad02|1&amp;quot;,&amp;quot;ClassId&amp;quot;:1073872969,&amp;quot;Properties&amp;quot;:[201342446,&amp;quot;1&amp;quot;,201342447,&amp;quot;5&amp;quot;,201342448,&amp;quot;3&amp;quot;,201342449,&amp;quot;1&amp;quot;,469777841,&amp;quot;Cambria&amp;quot;,469777842,&amp;quot;Arial&amp;quot;,469777843,&amp;quot;ＭＳ 明朝&amp;quot;,469777844,&amp;quot;Cambria&amp;quot;,201341986,&amp;quot;1&amp;quot;,469769226,&amp;quot;Cambria,Arial,ＭＳ 明朝&amp;quot;,268442635,&amp;quot;22&amp;quot;,469775450,&amp;quot;Quote1 Char&amp;quot;,201340122,&amp;quot;1&amp;quot;,134233614,&amp;quot;true&amp;quot;,469778129,&amp;quot;Quote1Char&amp;quot;,335572020,&amp;quot;1&amp;quot;,134231262,&amp;quot;true&amp;quot;,134224901,&amp;quot;true&amp;quot;,469777929,&amp;quot;Quote1&amp;quot;,469778324,&amp;quot;Default Paragraph Font&amp;quot;]}"&gt;“&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Quorum&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="Quote1"&gt;Cyber&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;’s&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="Quote1"&gt;reputation for customer focus and security expertise made them the ideal &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Microsoft&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;-v&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;erified &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;MDR&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="Quote1"&gt;partner.” &lt;STRONG&gt;–&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Vivek Kumar, Microsoft&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;“We saw Defender Experts &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;as a way to&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; extend our reach and deliver even more value to customers. It &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;wasn’t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; about replacing—it was about enhancing.”&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;–&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Ricky Simpson, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Quorum Cyber&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H5 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Why&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;eamwork&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 2"&gt;m&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;atters&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The Microsoft-verified MDR partner program was born out of a shared mission: to provide holistic, customer-led security solutions to address the growing security needs of organizations worldwide.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Today, cyber security needs to be a team sport. Organizations that provide security services, like Microsoft’s Defender Experts and Quorum Cyber, need to join together with customers to defend an ever-expanding attack surface against today’s sophisticated threats.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Facing the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;m&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;odern &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;hreat &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;l&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;andscape &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ogether&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;From skill shortages to complex attacks, organizations need security providers who can adapt and collaborate.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;“Hackers only need to get it right once&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; while &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;SecOp&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;s nee&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;ds&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; to get it right every time.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; Customers need an end-to-end security solution to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;eliminate&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; gaps and strengthen vulnerabilities.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; No &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;single &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;provider can address the needs of every organization&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;—&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;everywhere.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; Only teamwork can get the job done.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;” &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;–&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Vivek Kumar&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;, Microsoft&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H5 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;How&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 2"&gt;MDR providers working together is &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;important for CISOs and other security leaders&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Meeting &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;r&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;eal-world challenges&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Modern SecOps must navigate an increasingly complex and multifaceted threat landscape. One of the most pressing challenges is the global shortage of cybersecurity professionals. Although the security workforce has grown by 9%, the gap has widened even further, with nearly 4.8 million additional professionals needed to adequately protect organizations last year. ¹&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Meanwhile, adversaries are becoming more sophisticated and agile. They work in groups, using many individuals who process deep domain expertise is executing various attack techniques and tactics. In May 2024 alone, Microsoft Defender XDR detected over 176,000 incidents involving tampering with security settings, impacting more than 5,600 organizations. ²&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;That surge in threat activity coincides with a pivotal moment in technological evolution as organizations rapidly scale cloud operations and explore the transformative potential of generative AI. These innovations, while powerful, also expand the attack surface and the likelihood of gaps and vulnerabilities.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Comprehensive&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;c&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;overage &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;a&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;cross &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;ecurity &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;d&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;omains&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Defender Experts brings deep integration across Microsoft’s ecosystem and manages incidents across Microsoft Defender products (Endpoint, Office 365, Identity, Cloud Apps, and Defender for Cloud/Servers).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Quorum Cyber, a Microsoft-verified partner, offers flexibility and specialized coverage to extend beyond Microsoft Defender Experts.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;“&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;What &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;i&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;s so exciting about th&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;is approach,&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; is that t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;ogether, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;we &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;create&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;d&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; a layered defense strategy &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;that’s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; greater than the sum of its parts and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;provides coverage for &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;nearly&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="Quote1"&gt;all&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; of&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;customers’&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; envi&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;ronment&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;.&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Microsoft SDM/&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;SecDeliveryExpert&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; worked together with&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Quorum &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Cyber &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;to create&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;a&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="Quote1"&gt;nearly&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; seamless&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;, unified defense strategy. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;T&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;hey not only help to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;eliminate&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; the skills gap &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;but &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;are designed to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;scale easily to address &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;nearly &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;any&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; volume of&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; sophisticated&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; threats.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;”&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;–&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Sebastien Molendijk, Microsoft&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With shared tooling, real-time communication, and complementary expertise, this teamwork eliminates blind spots and delivers coverage across an environment that includes non-Defender Experts supported technology such as 3&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-fontsize="11"&gt;rd&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; party and legacy systems, custom applications, IoT, firewalls, network gear, and more. Additionally, the combined telemetry for all covered system&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;s&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, Defender Experts and Quorum Cyber, enriches incident context and improves detection accuracy and hunting.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Real-&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;w&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;orld &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;i&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;mpact&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt; – &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;C&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;ustomer &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;uccess &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;stories&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Proactive threat hunting is a core component of Defender Experts. Experts are not just cross-checking &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Indicators of Compromise (&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;IOCs&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; against the environment or only validating them against known &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;tactics, techniques, and procedures (&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;TTPs&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. The hunting approach is differentiated &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;by&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;the 78T signals and hundreds of tracked threat actors. The intelligence informing Microsoft hunts spans across nation state, criminal activity, evolving vulnerabilities, and newly observed behaviors. That is something &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Defender Experts can uniquely provide customers.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;One of many customer examples of this teamwork involved an organization already engaged with Quorum Cyber MDR for Microsoft E5 services. When Defender Experts engaged with the customer, the two teams co-created a solution tailored to meet the CISOs needs by combining Quorum Cyber’s analytics and monitoring with Defender Expert’s proactive threat hunting.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; That not only expanded coverage but provided the customer with both proactive and reactive services across nearly their entire environment.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Another example is adversary in the middle alerts, Defender Experts performs the investigation of malicious QR codes and then escalates to Quorum Cyber if malicious activity is observed. Quorum Cyber then takes delegated authority to reset the user's password, revokes their sessions, and takes other actions as needed.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;469777462&amp;quot;:[360],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[6]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Unique&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt; services&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Collaboration is more than Quorum Cyber and Microsoft working as one. Quorum Cyber develops unique services &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;including their&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; data security service – &lt;/SPAN&gt;&lt;A href="https://www.quorumcyber.com/services/clarity-data-data-security/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Clarity Data&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;. This service handles incidents generated via Microsoft Purview - DLP and IRM. It includes Quorum Cyber’s 24/7 365 SOC services to address those incidents without interfering with security signals being addressed by other analysts.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Operational&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;f&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;lexibility&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Customers have the option to divide responsibilities. For example, Microsoft manages Defender-specific alerts and Quorum Cyber manages alerts from all the other tools.&amp;nbsp; Guided response playbooks allow Microsoft Defender Experts and Quorum Cyber teams to work as one to perform containment and remediation across workstreams.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;“We built solution&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; from scratch, keeping customer outcomes at the center. The result&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;s&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="Quote1"&gt;are frictionless&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;, powerful security model&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;s that address unique customer needs&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;.” &lt;STRONG&gt;–&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Ricky Simpson&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Quorum Cyber&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P aria-level="3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Overcoming&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;c&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;hallenges, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;b&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;uilding &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;rust&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;w&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;orking as &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;o&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;ne&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Like building any team, there were hurdles. From workflow alignment to incident handoffs, mutual respect and a shared commitment to customer satisfaction paved the way to building frictionless workstreams.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Teamwork thrived on technical integration. Because Defender Experts is built atop the &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-business/mdb-get-started" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Defender portal&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; and &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/graph/overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Graph&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, the service is inherently designed for seamless collaboration. When Defender Experts assigns incidents, initiates proactive threat hunts, publishes investigation notes, or executes one-click remediation actions, those activities are fully integrated into both the Defender user experience and the Graph API.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;That integration enables Quorum Cyber to synchronize directly with those workflows, allowing their teams to operate within their existing toolsets while customers receive real-time updates and final resolutions through platforms such as Microsoft Defender, Sentinel, or their ITSM systems.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A notable example is the ‘real-time chat’ feature within Defender Experts, which is architected to support joint participation from both customers and partners like Quorum Cyber—ensuring transparency and responsiveness throughout the incident lifecycle.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;That level of tooling integration is essential to delivering a unified experience. Customers benefit from the deep expertise of Defender Experts, the broad coverage of a trusted partner like Quorum Cyber, and the operational efficiency of a tightly connected security services ecosystem. It truly represents the best of both worlds.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;“&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Defender Experts’ use of Microsoft Graph and Defender Portal enabled seamless incident sharing, real-time chat, and synchronized updates across platforms. Live dashboards from Defender Experts offer a clear, prioritized view of incidents. That allowed Defender Experts and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Quorum Cyber&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; to work as one team to keep customers secure and do that quickly and efficiently&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;.”&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;–&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Ricky Simpson&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Quorum Cyber&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H5 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;The &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;b&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;igger &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;p&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;icture&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; – &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;i&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;nnovation and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;g&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;rowth&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This partnership isn’t just about solving today’s problems—it’s about shaping the future. It&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; ha&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;s opened doors for Quorum Cyber to expand into new service areas, like managed data security, while reinforcing Microsoft’s commitment to flexible, scalable security solutions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;469777462&amp;quot;:[360],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[4]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Customers don’t have to choose between Microsoft and their trusted MDR provider like Quorum Cyber&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;—&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;t&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;hey can have both. By combining Microsoft Defender Experts with MDR providers like Quorum Cyber, organizations gain a flexible, scalable, and deeply integrated security strategy that adapts to their unique needs and can grow as they grow.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Whether you're augmenting your SOC, expanding global coverage, or navigating a transition, this “better together” model ensures your security operations are resilient, responsive, and ready for what’s next.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;“&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;We’ve proven&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;,&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; and our customer agree&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;,&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; that first-party and partner-led services can coexist and thrive together.”&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; &lt;STRONG&gt;–&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Ricky Simpson&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Quorum Cyber&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;“Customers get the best of both worlds—expertise from D&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;efender Experts&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; and coverage from &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Quorum Cyber&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;, all delivered as it should be&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;—&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;in a timely and seamless way.”&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt; &lt;STRONG&gt;–&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Vivek Kumar&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;, Microsoft&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H5 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;In &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;summary &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;–&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Microsoft Defender Experts and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Quorum Cyber&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;–&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;he benefits are clear&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;End-to-End Threat Protection&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;– &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Combines Microsoft Defender capabilities with Quorum Cyber&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; extended SOC services and third-party telemetry.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:2,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Comprehensive Coverage&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; –&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Protects both Microsoft and non-Microsoft environments, including legacy systems, IoT, and custom applications.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:2,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Proactive and Reactive Security&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; –&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Integrates threat hunting with incident response for full-spectrum defense.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:2,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Operational Flexibility&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; –&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Allows tailored division of responsibilities and coordinated remediation through guided playbooks.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:2,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Real-Time Collaboration&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; –&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Enables seamless communication and incident management via shared tooling, dashboards, and chat features.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:2,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="6" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Advanced Threat Intelligence&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; –&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Leverages Microsoft’s 78T signals and threat actor tracking, with partner TI, to enrich incident context and improve detection.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:2,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="7" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Complementary Services&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; –&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;For example, Quorum Cyber’s Clarity Data service handles Microsoft Purview incidents without disrupting other security workflows.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:2,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="8" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Unified Customer Experience&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; –&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Delivers frictionless, scalable, and resilient security operations through deep integration and mutual trust.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:2,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Learn more&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If you like this blog, and would like to learn more, see this insightful webinar for more details &lt;/SPAN&gt;&lt;A href="https://www.quorumcyber.com/webinars-videos/microsoft-and-quorum-better-together/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;The Better Together Story of Defender Experts and Quorum Cyber - Quorum Cyber&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;And listen to what these experts from Quorum Cyber and Microsoft have to say about the benefits of ‘Better Together.’&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/rickysimpson/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Ricky Simpson | LinkedIn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:2168604,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/pcaiazzo/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Paul Caiazzo | LinkedIn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:2168604,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/scott-mcmanus-710915210/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Scott McManus | LinkedIn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:2168604,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/raaewolfram/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Raae Wolfram | LinkedIn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:2168604,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/sebastien-molendijk-39244053/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Sebastien Molendijk | LinkedIn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:2168604,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/henryyan16/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Henry Yan | LinkedIn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:2168604,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/vivekkumar2k/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Vivek Kumar | LinkedIn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:2168604,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Next Steps&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:200,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For organizations considering a multi-provider strategy, the message is clear: collaboration works. Microsoft Defender Experts and Quorum Cyber show that when service providers align around customer needs, the results are transformative.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;“Microsoft Security has got you covered—whether through Defender Experts, partners like &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Quorum Cyber&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;, or both.” &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;–&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Vivek Kumar&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Quote1"&gt;Microsoft&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:360}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Ready to strengthen your cyber resilience,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Join the conversation through Microsoft’s public webinar series&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Explore the CTI community&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Reach out to learn more about how this partnership can support your organization.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Sources&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;¹ &lt;A href="https://www.forbes.com/sites/emilsayegh/2025/02/05/the-cybersecurity-crisis-companies-cant-fill-roles-workers-shut-out/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;ISC2-2024-Cybersecurity-Workforce-Study&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;² &lt;A href="https://www.microsoft.com/security/security-insider/threat-landscape/microsoft-digital-defense-report-2024" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Digital Defense Report 2024&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Sep 2025 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/how-microsoft-defender-experts-and-partners-like-quorum-cyber/ba-p/4452639</guid>
      <dc:creator>Raae_</dc:creator>
      <dc:date>2025-09-18T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Cloud forensics: Why enabling Microsoft Azure Storage Account logs matters</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/cloud-forensics-why-enabling-microsoft-azure-storage-account/ba-p/4445723</link>
      <description>&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Co-authors -&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Christoph Dreymann - Shiva P&lt;/SPAN&gt;&lt;/H5&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-teams="true"&gt;Introduction&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;Azure Storage Accounts are frequently targeted by threat actors. Their goal is to exfiltrate sensitive data to an external infrastructure under their control. Because diagnostic logging is not always fully enabled by default, valuable evidence of their malicious actions may be lost.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;With this blog, we will explore realistic attack scenarios and demonstrate the types of artifacts those activities generate. By properly enabling Microsoft Azure Storage Account logs investigators gain a better understanding of the scope of the incident. The information can also provide guidance for remediating the environment and on preventing data theft from occurring again.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Storage Account&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A Storage Account provides scalable, secure, and highly available storage for storing and managing data objects. Due to the variety of sensitive data that can be stored, it is another highly valued target by a threat actor.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Threat actors exploit misconfigurations, weak access controls, and leaked credentials to gain unauthorized access. Key risks include Shared Access Signature token (SAS) misuse that allows threat actors to access or modify exposed blob storages. Storage Account key exposure could grant privileged access to the data plane.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Investigating storage-related security incidents requires familiarity with Azure activity logs and Diagnostic logs. Diagnostic log types for Storage accounts are StorageBlob, StorageFile, StorageQueue, and StorageTable. These logs can help identify unusual access patterns, role changes, and unauthorized SAS token generation. This blog is centered around StorageBlob activity logs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Storage Account logging&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The logs for a Storage Account aren’t enabled by default. These logs capture operations, requests, and use such as read, write, and delete actions/requests on storage objects like blobs, queues, files, or tables. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;NOTE: &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;There are no license requirements to enable Storage Account logging, but Log Analytics charges based on ingestion and retention&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; (&lt;/SPAN&gt;&lt;A href="https://azure.microsoft.com/en-us/pricing/details/monitor/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;U&gt;Pricing - Azure Monitor | Microsoft Azure&lt;/U&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;For more information on enabling logging for a Storage Account can be found &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/storage/common/manage-storage-analytics-logs?tabs=azure-portal" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;U&gt;here&lt;/U&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Notable fields&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The log entries contain various fields which are of use not only during or after an incident, but for general monitoring of a storage account during normal operations (for a full list, see what&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-monitor/reference/tables/storagebloblogs" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;U&gt;data is available in the Storage Logs&lt;/U&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Once the storage log is enabled, one of the key tables within Log Analytics is&amp;nbsp;&lt;STRONG&gt;StorageBlobLogs&lt;/STRONG&gt;, which provides details about blob storage operations, including read, write, and delete actions. Key columns such as &lt;EM&gt;OperationName&lt;/EM&gt;, &lt;EM&gt;AuthenticationType&lt;/EM&gt;, &lt;EM&gt;StatusText&lt;/EM&gt;, and &lt;EM&gt;UserAgentHeader &lt;/EM&gt;capture essential information about these activities.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The &lt;EM&gt;OperationName &lt;/EM&gt;field identifies operations on a storage account, such as “&lt;EM&gt;PutBlob&lt;/EM&gt;” for uploads or “&lt;EM&gt;DeleteBlob&lt;/EM&gt;” and “&lt;EM&gt;DeleteFile&lt;/EM&gt;” for deletions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The &lt;EM&gt;UserAgentHeader &lt;/EM&gt;fields offer valuable insights into the tools used to access a Blob storage. Accessing blob storages through the Azure portal is typically logged with a generic user agent, which indicates the application used to perform the access, such as a web browser like Mozilla Firefox. In contrast, tools like AzCopy or Microsoft Azure Storage Explorer are explicitly identified in the logs. Analyzing the &lt;EM&gt;UserAgentHeader&lt;/EM&gt; provides crucial details about the access method, helping determine how the blob storage was accessed.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The following table includes additional investigation fields,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-background-color-16 lia-border-color-21" border="1" style="width: 99.7222%; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Field name&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Description&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;TimeGenerated [UTC]&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The date and time of the operation request.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;AccountName&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Name of the Storage account.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;OperationName&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Name of the operation.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A detailed list of for StorageBlob operation can be found &lt;/SPAN&gt;&lt;U&gt;&lt;A href="https://learn.microsoft.com/en-us/rest/api/storageservices/blob-service-rest-api" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;here&lt;/SPAN&gt;&lt;/A&gt;&lt;/U&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;AuthenticationType&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The type of authentication that was used to make this request.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;StatusCode&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The HTTP status code for the request. If the request is interrupted, this value might be set to Unknown.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;StatusText&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The status of the requested operation.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Uri&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Uniform resource identifier that is requested.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;CallerIpAddress&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The IP address of the requester, including the port number.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;UserAgentHeader&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The User-Agent header value.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;ObjectKey&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Provides the path of the object requested.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;RequesterUpn&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;User Principal Name of the requester.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;AuthenticationHash&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-left lia-border-color-21"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Hash of the authentication token used during a request.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Request authenticated with SAS token includes a SAS signature specifying the hash derived from the signature part of the SAS token.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For a full list, see &lt;/SPAN&gt;&lt;U&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-monitor/reference/tables/storagebloblogs" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;what data is available in the Storage Logs&lt;/SPAN&gt;&lt;/A&gt;.&lt;/U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;How a threat actor can access a Storage Account&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Threat actors can access the Storage Account through Azure-assigned RBAC, a SAS token (including User delegated SAS&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;token), Azure Storage Account Keys and Anonymous Access (if configured).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Storage Account Access Keys&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Azure Storage Account Access Keys are shared secrets that enable full access to Azure storage resources. When creating a storage account, Azure generates two access keys, both can be used for authentication with the storage account. These keys are permanent and do not have an expiration date.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Both Storage Account Owners and roles such as Contributor or any other role with the assigned action of &lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft.Storage/storageAccounts/listKeys/action&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN data-contrast="auto"&gt; can retrieve and use these credentials to access the storage account.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Account Access Keys&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; can be rotated/regenerated but if done unintentionally, it could disrupt applications or services dependent on the key for authentication. Additionally, this action invalidates any SAS tokens derived from that key, potentially revoking access to dependent workflows.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Monitoring key rotations can help detect unexpected changes and mitigate disruptions. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Query: &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;This query can help identify instances of account key rotations in the logs&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;AzureActivity 
| where OperationNameValue has "MICROSOFT.STORAGE/STORAGEACCOUNTS/REGENERATEKEY/ACTION"
| where ActivityStatusValue has "Start"
| extend resource = parse_json(todynamic(Properties).resource)
| extend requestBody = parse_json(todynamic(Properties).requestbody)
| project TimeGenerated, OperationNameValue, resource, requestBody, Caller, CallerIpAddress&lt;/LI-CODE&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Shared Access Signature&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;SAS tokens offer a granular method for controlling access to Azure storage resources. SAS tokens enable specific permitted actions on a resource and their duration. They can be generated for blobs, queues, tables, and file shares within a storage account, providing precise control over data access. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;A SAS token allows access via a signed URL.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A Storage Account Owner can generate a SAS token and connection strings for various resources within the storage account (e.g., blobs, containers, tables) without restrictions. Additionally, roles with &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;EM&gt;Microsoft.Storage/storageAccounts/listKeys/action&lt;/EM&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;rights&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;can also generate SAS tokens.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;SAS tokens enable access to storage resources using tools such as Azure Storage Explorer, Azure CLI, or PowerShell.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;It is important to note that the logs do not indicate when a SAS token was generated [&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/storage/common/storage-sas-overview?toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json&amp;amp;bc=%2Fazure%2Fstorage%2Fblobs%2Fbreadcrumb%2Ftoc.json" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;U&gt;How a shared access signature works&lt;/U&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;]. However, their usage can be inferred by tracking configuration changes that enable the use of storage account keys option which is disabled by default. &lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE&gt;&lt;SPAN class="lia-text-color-19"&gt;Figure 1: Configuration setting to enable account key access&lt;/SPAN&gt;&lt;EM class="lia-align-center"&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Query:&lt;/SPAN&gt; &lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;SPAN data-contrast="auto"&gt;This query is designed to detect configuration changes made to enable access via storage account keys&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;AzureActivity 
| where OperationNameValue has "MICROSOFT.STORAGE/STORAGEACCOUNTS/WRITE" 
| where ActivityStatusValue has "Success" 
| extend allowSharedKeyAccess = parse_json(tostring(parse_json(tostring(parse_json(Properties).responseBody)).properties)).allowSharedKeyAccess 
| where allowSharedKeyAccess == "true"&lt;/LI-CODE&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;User delegated Shared Access Signature&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/rest/api/storageservices/create-user-delegation-sas#assign-permissions-with-rbac" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;U&gt;User Delegation SAS&lt;/U&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; is a type of SAS token that is secured using Microsoft Entra ID credentials rather than the storage account key.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For more details see &lt;/SPAN&gt;&lt;U&gt;&lt;A href="https://learn.microsoft.com/en-us/rest/api/storageservices/create-user-delegation-sas#authorize-a-user-delegation-sas" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Authorize a user delegation SAS&lt;/SPAN&gt;&lt;/A&gt;&lt;/U&gt;&lt;SPAN data-contrast="auto"&gt;&lt;U&gt;.&lt;/U&gt; To request a SAS token using the user delegation key, the identity must possess the &lt;EM&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft.Storage/storageAccounts/blobServices/generateUserDelegationKey&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN data-contrast="auto"&gt;  action (see &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/rest/api/storageservices/create-user-delegation-sas#assign-permissions-with-rbac" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;U&gt;Assign permissions with RBAC&lt;/U&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Azure Role-Based Access Control&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A threat actor must identify a target (an identity) that can assign roles or already holds specific RBAC roles.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To assign Azure RBAC roles, an identity must have &lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft.Authorization/roleAssignments/write&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN data-contrast="auto"&gt;, which allows the assignment of roles necessary for accessing storage accounts.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Some examples of roles that provide permissions to access data within Storage Account (see &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/storage/blobs/assign-azure-role-data-access?tabs=portal" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;U&gt;Azure built-in roles for blob&lt;/U&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;):&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1380,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Storage Account Contributor (Read, Write, Manage Access)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1380,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Storage Blob Data Contributor (Read, Write)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1380,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Storage Blob Data Owner (Read, Write, Manage Access)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1380,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Storage Blob Data Reader (Read Only)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Additionally, to access blob data in the Azure portal, a user must also be assigned the Reader role (see&amp;nbsp;&lt;/SPAN&gt;&lt;U&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/storage/blobs/assign-azure-role-data-access?tabs=portal" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Assign an Azure role&lt;/SPAN&gt;&lt;/A&gt;&lt;/U&gt;&lt;SPAN data-contrast="auto"&gt;). More information about Azure built-in roles for a Storage Account can be found here &lt;/SPAN&gt;&lt;U&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles/storage%22%20/l%20%22storage-blob-data-owner" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Azure built-in roles for Storage&lt;/SPAN&gt;&lt;/A&gt;&lt;/U&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Anonymous Access&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If the storage account configuration 'Allow Blob anonymous access' is set to enabled and a container is created with anonymous read access, a threat actor could access the storage contents from the internet without any authorization.&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class="lia-text-color-19"&gt;Figure 2: Configuration settings for Blob anonymous access and container-level anonymous access.&lt;/SPAN&gt;&lt;EM class="lia-align-center"&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Query: &lt;/STRONG&gt;This query helps identify successful configuration changes to enable anonymous access&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;AzureActivity 
| join kind=rightouter (AzureActivity | where TimeGenerated &amp;gt; ago(30d) | where OperationNameValue has "MICROSOFT.STORAGE/STORAGEACCOUNTS/WRITE" | where Properties has "allowBlobPublicAccess" | extend ProperTies = parse_json(Properties) | evaluate bag_unpack(ProperTies) | extend allowBlobPublicAccess = todynamic(requestbody).properties["allowBlobPublicAccess"] | where allowBlobPublicAccess has "true" | summarize by CorrelationId) on CorrelationId 
| extend ProperTies = parse_json(Properties) 
| evaluate bag_unpack(ProperTies) 
| extend allowBlobPublicAccess_req = todynamic(requestbody).properties["allowBlobPublicAccess"] 
| extend allowBlobPublicAccess_res = todynamic(responseBody).properties["allowBlobPublicAccess"] 
| extend allowBlobPublicAccess = case (allowBlobPublicAccess_req!="", allowBlobPublicAccess_req, allowBlobPublicAccess_res!="", allowBlobPublicAccess_res, "") 
| project OperationNameValue, ActivityStatusValue, ResourceGroup, allowBlobPublicAccess, Caller, CallerIpAddress, ResourceProviderValue&lt;/LI-CODE&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Key notes regarding the authentication methods&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When a user accesses Azure Blob Storage via the Azure portal, the interaction is authenticated using OAuth and is authorized by the Azure RBAC roles configuration for the given user. In contrast, authentication using Azure Storage Explorer and AzCopy depends on the method used:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;If a user interactively signs in via the Azure portal or utilizes the Device code flow, authentication appears as OAuth based.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;When using a SAS token, authentication is recorded as SAS-based for both tools.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Access via Azure RBAC is logged in Entra ID Sign-in Logs, however, activity related to SAS token usage does not appear in the sign-in logs, as it provides pre-authorized access. Log analysis should consider all operations, since initial actions can reveal the true authentication method even OAuth-based access may show as SAS in logs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The screenshot below illustrates three distinct cases, each showcasing different patterns of authentication types used when accessing storage resources.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;A SAS token is consistently used across various operations, where the SAS token is the primary access method.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;The example below highlighted as ‘2’ demonstrates a similar pattern, with OAuth (using assigned Azure RBAC role) serving as the primary authentication method for all listed operations.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Lastly, example number ‘3’, Operations start with OAuth authentication (using an assigned Azure RBAC role for authorization) and then uses a SAS token, indicating mixed authentication types.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;img /&gt;
&lt;PRE&gt;&lt;SPAN class="lia-text-color-19"&gt;Figure 3: Different patterns of authentication types&lt;/SPAN&gt;&lt;EM class="lia-align-center"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Additionally, when using certain applications such as Azure Storage Explorer with&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Account Access Keys&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; authentication, the initial operations such as ListContainers and ListBlob are logged with the authentication type reported as “&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;AccountKey”&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. However, for subsequent actions like file uploads or downloads, the authentication type switches to &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;SAS&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; in the logs.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To accurately determine whether an&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Account Access Keys&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; or &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;SAS&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; was used, it's important to correlate these actions with the earlier enumeration or sync activity within the logs.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With this understanding, let’s proceed to analyze specific attack scenarios by utilizing the log analytics, such as the&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; S&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;torageBlobLogs table.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Attack scenario&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This section will examine the typical steps that a threat actor might take when targeting a Storage Account. We will specifically focus on the Azure Resource Manager layer, where Azure RBAC initially dictates what a threat actor can discover.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Enumeration&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;During enumeration, a threat actor’s goal is to map out the available storage accounts. The range of this discovery is decided by the access privileges of a compromised identity. If that identity holds at least a minimum level of access (similar to a Reader) at the subscription level, it can view storage account resources without making any modifications. Importantly, this permission level does not grant access to the actual data stored within the Azure Storage itself. Hence, a threat actor is limited to interacting only with those storage accounts that are visible to them.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To access and download files from Blob Storage, a threat actor must be aware of the names of containers (Operation: &lt;EM&gt;ListContainers&lt;/EM&gt;) and the files within those containers (Operation: &lt;EM&gt;ListBlobs&lt;/EM&gt;). All interactions with these storage elements are recorded in the &lt;STRONG&gt;StorageBlobLogs &lt;/STRONG&gt;table.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Containers or blobs in a container can be listed by a threat actor with the appropriate access rights. If access is not authorized, attempts to do so will result in error codes shown in the &lt;EM&gt;StatusCode &lt;/EM&gt;field. A high number of unauthorized attempts resulting in errors would be a key indicator of suspicious activity or misconfiguration.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE&gt;&lt;SPAN class="lia-text-color-19"&gt;Figure 4: Failure attempts to list blobs/containers&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Query:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt; This query serves as a starting point for detecting a spike in unauthorized attempts to enumerate containers, blobs, files, or queues&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;union Storage* 
| extend StatusCodeLong = tolong(StatusCode) 
| where OperationName has_any ("ListBlobs", "ListContainers", "ListFiles", "ListQueues") 
| summarize MinTime = min(TimeGenerated), MaxTime = max(TimeGenerated), OperationCount = count(), UnauthorizedAccess = countif(StatusCodeLong &amp;gt;= 400), OperationNames = make_set(OperationName), ErrorStatusCodes = make_set_if(StatusCode, StatusCodeLong &amp;gt;= 400), StorageAccountName = make_set(AccountName) by CallerIpAddress 
| where UnauthorizedAccess &amp;gt; 0&lt;/LI-CODE&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Note:&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; The UnauthorizedAccess filter attribute must be adjusted based on your environment. &lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Data exfiltration&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Let’s use the &lt;STRONG&gt;StorageBlobLogs&lt;/STRONG&gt; to analyze two different attack scenarios. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Scenario 1: Compromised user has access to a storage account&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In this scenario, the threat actor either compromises a user account with access to one or more storage accounts or alternatively, obtains a leaked &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Account Access Key &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;or&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; SAS token&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. With a compromised identity, the threat actor can either enumerate all storage accounts the user has permissions to (as covered in enumeration) or directly access a specific blob or container if the leaked key grants scoped access.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Account Access Keys (AccountKey)/SAS tokens&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The threat actor might either use the storage account’s access keys or SAS token retrieved through the compromised user account provided they have the &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/storage/common/storage-account-keys-manage?tabs=azure-portal#manually-rotate-access-keys" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;U&gt;appropriate permissions&lt;/U&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; or the leaked key itself may already be either an Account&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;access key or SAS token. Access keys grant complete control while SAS key can generate a time-bound access, to authorize data transfers enabling them to view, upload, or download data at will.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE&gt;&lt;SPAN class="lia-text-color-19"&gt;Figure 5: Account key used to download/view data&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;img /&gt;
&lt;PRE&gt;&lt;SPAN class="lia-text-color-19"&gt;Figure 6: SAS token used to download/view data&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Query:&amp;nbsp;&lt;/SPAN&gt; &lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;SPAN data-contrast="auto"&gt;This query helps identify cases where an AccountKey/SAS was used to download/view data from a storage account&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;StorageBlobLogs 
| where OperationName has "GetBlob" 
| where AuthenticationType in~ ("AccountKey", "SAS") 
| where StatusText in~ ("Success", "AnonymousSuccess", "SASSuccess") 
| project TimeGenerated, AccountName, OperationName, RequesterUpn, AuthenticationType, Uri, ObjectKey, StatusText, UserAgentHeader, CallerIpAddress, AuthenticationHash&lt;/LI-CODE&gt;
&lt;H6&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;User Delegation SAS&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Available for &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Blob Storage&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; only, a User Delegation SAS functions similar to a SAS but is protected with Microsoft Entra ID credentials rather than the storage account key.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The creation of a &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;User Delegation SAS&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; is tracked as a corresponding &lt;EM&gt;"&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;GetUserDelegationKey"&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN data-contrast="auto"&gt;&lt;EM&gt; &lt;/EM&gt;log entry in &lt;STRONG&gt;StorageBlobLogs &lt;/STRONG&gt;table.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE&gt;&lt;SPAN class="lia-text-color-19"&gt;Figure 7: User-Delegation Key created&lt;/SPAN&gt;&lt;EM class="lia-align-left"&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Query:&amp;nbsp;&lt;/SPAN&gt; &lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;This query helps identify creation of a User-Delegation Key. The &lt;EM&gt;RequesterUpn &lt;/EM&gt;provides the identity of the user account creating this key.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;StorageBlobLogs 
| where OperationName has "GetUserDelegationKey" 
| where StatusText in~ ("Success", "AnonymousSuccess", "SASSuccess") 
| project TimeGenerated, AccountName, OperationName, RequesterUpn, Uri, CallerIpAddress, ObjectKey, AuthenticationType, StatusCode, StatusText&lt;/LI-CODE&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE&gt;&lt;SPAN class="lia-text-color-19"&gt;Figure 8: User-Delegation activity to download/read&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Query:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;T&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;SPAN data-contrast="auto"&gt;his query helps identify cases where a download/read action was initiated while authenticated via a User delegation key&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;StorageBlobLogs 
| where AuthenticationType has "DelegationSas" 
| where OperationName has "GetBlob" 
| where StatusText in~ ("Success", "AnonymousSuccess", "SASSuccess") 
| project Type, TimeGenerated, OperationName, AccountName, UserAgentHeader, ObjectKey, AuthenticationType, StatusCode, CallerIpAddress, Uri&lt;/LI-CODE&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The operation "&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;GetUserDelegationKey"&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN data-contrast="auto"&gt;&lt;EM&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/EM&gt;within the &lt;STRONG&gt;StorageBlobLogs&lt;/STRONG&gt; captures the identity responsible for generating a &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;User Delegation SAS &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;token. The &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;AuthenticationHash&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; field shows the Key used to sign the SAS token.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When the &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;SAS &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;token is used, any operations will include the same &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;SAS signature hash&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; enabling you to correlate various actions performed using this token even if the originating IP addresses differ.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Query:&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The following query extracts a SAS signature hash from the AuthenticationHash field. This helps to track the token's usage, providing an audit trail to identify potentially malicious activity.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;StorageBlobLogs 
| where AuthenticationType has "DelegationSas" 
| extend SasSHASignature = extract(@"SasSignature\((.*?)\)", 1, AuthenticationHash) 
| project Type, TimeGenerated, OperationName, AccountName, UserAgentHeader, ObjectKey, AuthenticationType, StatusCode, CallerIpAddress&lt;/LI-CODE&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In the next scenario, we examine how a threat actor already in control of a compromised identity uses Azure RBAC to assign permissions. With administrative privileges over a storage account, the threat actor can grant access to additional accounts and establish long-term access to the storage accounts. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Scenario 2: A user account is controlled by the threat actor and has elevated access to the Storage Account&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;An identity named Bob was identified as compromised due to an unauthorized IP login.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The investigation triggers when Azure &lt;STRONG&gt;Sign-in&lt;/STRONG&gt; logs reveal logins originating from an unexpected location. This account has owner permissions for a resource group, allowing full access and role assignments in Azure RBAC. The threat actor grants access to another account they control, as shown in the &lt;STRONG&gt;AzureActivity&lt;/STRONG&gt; logs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The &lt;STRONG&gt;AzureActivity&lt;/STRONG&gt; logs in the figure below show that Reader, Data Access, and Storage Account Contributor roles were assigned to &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Hacker2&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; for a Storage Account within Azure:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE&gt;&lt;SPAN class="lia-text-color-19"&gt;Figure 9: Assigning a role to a user&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Query: &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;This query helps identify if a role has been assigned to a user&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;AzureActivity 
| where Caller has "Bob" 
| where OperationNameValue has "MICROSOFT.AUTHORIZATION/ROLEASSIGNMENTS/WRITE" 
| extend RoleDefintionIDProperties = parse_json(Properties) 
| evaluate bag_unpack(RoleDefintionIDProperties) 
| extend RoleDefinitionIdExtracted = tostring(todynamic(requestbody).Properties.RoleDefinitionId) 
| extend RoleDefinitionIdExtracted = extract(@"roleDefinitions/([a-f0-9-]+)", 1, RoleDefinitionIdExtracted) 
| extend RequestedRole = case( RoleDefinitionIdExtracted == "ba92f5b4-2d11-453d-a403-e96b0029c9fe", "Storage Blob Data Contributor", RoleDefinitionIdExtracted == "b7e6dc6d-f1e8-4753-8033-0f276bb0955b", "Storage Blob Data Owner", RoleDefinitionIdExtracted == "2a2b9908-6ea1-4ae2-8e65-a410df84e7d1", "Storage Blob Data Reader", RoleDefinitionIdExtracted == "db58b8e5-c6ad-4a2a-8342-4190687cbf4a", "Storage Blob Delegator", RoleDefinitionIdExtracted == "c12c1c16-33a1-487b-954d-41c89c60f349", "Reader and Data Access", RoleDefinitionIdExtracted == "17d1049b-9a84-46fb-8f53-869881c3d3ab","Storage Account Contributor", "") 
| extend roleAssignmentScope = tostring(todynamic(Authorization_d).evidence.roleAssignmentScope) 
| extend AuthorizedFor = tostring(todynamic(requestbody).Properties.PrincipalId) 
| extend AuthorizedType = tostring(todynamic(requestbody).Properties.PrincipalType) 
| project TimeGenerated, RequestedRole, roleAssignmentScope, ActivityStatusValue, Caller, CallerIpAddress, CategoryValue, ResourceProviderValue, AuthorizedFor, AuthorizedType&lt;/LI-CODE&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Note: Refer to&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt; &lt;U&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;this resource for additional Azure in-built role IDs&lt;/SPAN&gt;&lt;/A&gt;&lt;/U&gt; &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN data-contrast="auto"&gt;that can be used in this query.&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The &lt;STRONG&gt;Sign-in&lt;/STRONG&gt;&amp;nbsp;logs indicate that &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Hacker2&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; successfully accessed Azure from the same malicious IP address.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We can examine &lt;STRONG&gt;StorageBlobLogs &lt;/STRONG&gt;to determine if the user accessed data of the blob storage since specific roles related to the Storage Account were assigned to them.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The activities within the blob storage indicate several entries attributed to the &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Hacker2&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; user, as shown in the figure below.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE&gt;&lt;SPAN class="lia-text-color-19"&gt;Figure 10: User access to blob storage&lt;/SPAN&gt;&lt;SPAN class="lia-align-left"&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;EM class="lia-align-left"&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Query:&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:259}"&gt; &lt;SPAN data-contrast="auto"&gt;This query helps identify access to blob storage from a malicious IP&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;StorageBlobLogs 
| where TimeGenerated &amp;gt; ago (30d) 
| where CallerIpAddress has {{IPv4}} 
| extend ObjectName= ObjectKey 
| project TimeGenerated, AccountName, OperationName, AuthenticationType, StatusCode, StatusText, RequesterUpn, CallerIpAddress, UserAgentHeader, ObjectName, Category&lt;/LI-CODE&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;An analysis of the &lt;STRONG&gt;StorageBlobLogs&lt;/STRONG&gt;, as shown in the figure below, reveals that Hacker2 performed a "S&lt;EM&gt;torageRead"&lt;/EM&gt;&amp;nbsp;operation on three files. This indicates that data was accessed or downloaded from blob storage.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE&gt;&lt;SPAN class="lia-text-color-19"&gt;Figure 11: Blob Storage Read/Download activities&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The &lt;EM&gt;UserAgentHeader &lt;/EM&gt;suggests that the storage account was accessed through the Azure portal. Consequently, the SignInLogs can offer further detailed information.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Query&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&amp;nbsp;&lt;/SPAN&gt; &lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;This query checks for read, write, or delete operations in blob storage and their access methods,&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="kusto"&gt;StorageBlobLogs 
| where TimeGenerated &amp;gt; ago(30d) 
| where CallerIpAddress has {{IPv4}} 
| where OperationName has_any ("PutBlob", "GetBlob", "DeleteBlob") and StatusText == "Success" 
| extend Notes = case( OperationName == "PutBlob" and Category == "StorageWrite" and UserAgentHeader has "Microsoft Azure Storage Explorer", "Blob was written through Azure Storage Explorer", OperationName == "PutBlob" and Category == "StorageWrite" and UserAgentHeader has "AzCopy", "Blob was written through AzCopy Command", OperationName == "PutBlob" and Category == "StorageWrite" and not(UserAgentHeader has_any("AzCopy","Microsoft Azure Storage Explorer")), "Blob was written through Azure portal", OperationName == "GetBlob" and Category == "StorageRead" and UserAgentHeader has "Microsoft Azure Storage Explorer", "Blob was Read/Download through Azure Storage Explorer", OperationName == "GetBlob" and Category == "StorageRead" and UserAgentHeader has "AzCopy", "Blob was Read/Download through AzCopy Command", OperationName == "GetBlob" and Category == "StorageRead" and not(UserAgentHeader has_any("AzCopy","Microsoft Azure Storage Explorer")), "Blob was Read/Download through Azure portal", OperationName == "DeleteBlob" and Category == "StorageDelete" and UserAgentHeader has "Microsoft Azure Storage Explorer", "Blob was deleted through Azure Storage Explorer", OperationName == "DeleteBlob" and Category == "StorageDelete" and UserAgentHeader has "AzCopy", "Blob was deleted through AzCopy Command", OperationName == "DeleteBlob" and Category == "StorageDelete" and not(UserAgentHeader has_any("AzCopy","Microsoft Azure Storage Explorer")), "Blob was deleted through Azure portal","") 
| project TimeGenerated, AccountName, OperationName, AuthenticationType, StatusCode, CallerIpAddress, ObjectName=ObjectKey, Category, RequesterUpn, Notes&lt;/LI-CODE&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;The log analysis confirms that the threat actor successfully extracted data from a storage account.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Storage Account &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;ummary&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Detecting misuse within a Storage Account can be challenging, as routine operations may hide malicious activities. However, enabling logging is essential for investigation to help track accesses, especially when compromised identities or misused SAS tokens or keys are involved.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Unusual changes in user permissions and irregularities in role assignments which are documented in the Azure Activity Logs, can signal unauthorized access, while Microsoft Entra ID sign-in logs can help identify compromised UPNs and suspicious IP addresses that ties into OAuth-based storage account access. By thoroughly analyzing Storage Account logs which details operation types and access methods, investigators can identify abuse and determine the scope of compromise. That not only helps when remediating the environment but can also provide guidance on preventing unauthorized data theft from occurring again.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Sep 2025 17:18:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/cloud-forensics-why-enabling-microsoft-azure-storage-account/ba-p/4445723</guid>
      <dc:creator>Abul_Azed</dc:creator>
      <dc:date>2025-09-02T17:18:11Z</dc:date>
    </item>
    <item>
      <title>Post-breach browser abuse: a new frontier for threat actors</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/post-breach-browser-abuse-a-new-frontier-for-threat-actors/ba-p/4445722</link>
      <description>&lt;H5&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Co-authors &lt;/STRONG&gt;- Raae Wolfram | Sam Gardener&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Once an attacker has gained access to a system, the browser becomes a rich source of credentials, a platform for persistence, and a stealthy channel for data exfiltration. This blog outlines key abuse techniques and provides actionable detection strategies using Microsoft Defender for Endpoint and Microsoft Defender XDR.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="auto"&gt;Why browsers matter after the breach&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Post-compromise, browsers offer attackers:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Access to &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;credentials&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; (cookies, tokens, autofill data)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Control over &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;peripherals&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;(camera, microphone, location)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;A &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;trusted execution environment&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; for evasion&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;A platform for &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;persistence&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; via extensions or debugging interfaces&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;These capabilities make browsers a high-value target even after initial access has been achieved.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="auto"&gt;Key abuse techniques and detection strategies&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;1. Credential theft via memory scraping&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Attackers can extract sensitive data directly from browser memory using tools like Mimikittenz. Security team members can proactively hunt for threats with advanced hunting in Microsoft Defender.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Advanced hunting detection query:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;EM&gt;let PROCESS_VM_READ=0x0010;&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;EM&gt;DeviceEvents&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;EM&gt;| where ActionType == "OpenProcessApiCall"&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;EM&gt;    and FileName in~ ("chrome.exe", "msedge.exe", "firefox.exe", "brave.exe", "opera.exe")&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;EM&gt;| project FileName, InitiatingProcessFileName,&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; DesiredAccess=tolong(parse_json(AdditionalFields).DesiredAccess)&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;EM&gt;| where binary_and(DesiredAccess, PROCESS_VM_READ) != 0&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Learn more at about hunting queries:&amp;nbsp; &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-xdr/advanced-hunting-overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Overview - Advanced hunting - Microsoft Defender XDR | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;2. TLS key logging for passive credential capture&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Setting the SSLKEYLOGFILE environment variable allows attackers to dump TLS pre-master secrets, enabling decryption of HTTPS traffic.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Detection query:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;DeviceRegistryEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where RegistryKey =~ @"SYSTEM\CurrentControlSet\Control\Session Manager\Environment"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;    and RegistryValueName =~ "SSLKEYLOGFILE"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;3. Remote debugging port abuse&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Chromium-based browsers support remote debugging via WebSocket. Attackers can launch browsers with flags like --remote-debugging-port and control them programmatically.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Detection queries:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;DeviceProcessEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where FileName in~ ("chrome.exe", "msedge.exe", "brave.exe", "opera.exe")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;    and ProcessCommandLine contains "--remote"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;DeviceNetworkEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where RemotePort in (9222, 9223, 9229)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where RemoteIP == "127.0.0.1"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where InitiatingProcessFileName !in~ ("chrome.exe", "msedge.exe", "brave.exe", "opera.exe")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;DeviceProcessEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where FileName has_any ("chrome", "msedge", "brave", "opera")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;    and ProcessCommandLine contains "--remote"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;4. Persistence via malicious extensions&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Attackers can sideload or auto-update malicious extensions using enterprise policies or developer mode.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Detection queries:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;DeviceProcessEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where ProcessCommandLine has "--load-extension"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where FileName in~ ("chrome.exe", "msedge.exe")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;DeviceRegistryEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where RegistryKey has "ExtensionInstallForcelist"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where RegistryValueData has_any ("http", "crx")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;5. Anomalous child process spawning&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Unexpected child processes from browsers may indicate injection, persistence, or evasion.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Detection query:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;DeviceProcessEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where InitiatingProcessFileName in~ ("chrome.exe", "msedge.exe", "firefox.exe", “brave.exe”, “opera.exe”)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where FileName !in~ ("chrome.exe", "msedge.exe", "firefox.exe")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Recommendations for defenders:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Monitor for &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;debugging flags&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; in browser launch commands.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Alert on&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;unexpected registry or file modifications&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; related to extensions.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Track &lt;STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;environment variable usage&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; that affects browser behavior.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Investigate &lt;STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;RWX memory pages&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; in browser processes.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Use &lt;STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;Defender for Endpoint&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; to correlate these signals with broader attack chains.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;SPAN data-contrast="auto"&gt;Conclusion&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Post-breach browser abuse is a growing concern that blends stealth, persistence, and credential access into a single threat vector. By understanding these techniques and implementing the detection strategies outlined above, defenders can close a critical visibility gap and better protect their environments.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;See what our experts have to say. Watch the recorded webinar, download the presentation - and &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Faka.ms%2FDefenderExpertsWebinar-EpisodeIV&amp;amp;data=05%7C02%7Cv-smithemi%40microsoft.com%7C67f1aa0a5a894a3264d208dde193512e%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638914745030963049%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=bbpDolDSC7Vr2numwXaw1FOq04OG%2FLaemePrMvfKJLw%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;learn more about - Post-Breach Browsers: The Hidden Threat You’re Overlooking&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Aug 2025 17:22:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/post-breach-browser-abuse-a-new-frontier-for-threat-actors/ba-p/4445722</guid>
      <dc:creator>Jonathan Bar Or (JBO)</dc:creator>
      <dc:date>2025-08-25T17:22:36Z</dc:date>
    </item>
    <item>
      <title>Welcome to the Microsoft Defender Experts Ninja Hub!</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/welcome-to-the-microsoft-defender-experts-ninja-hub/ba-p/4442210</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Updated August 11, 2025&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender Experts for XDR&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/security/business/services/microsoft-defender-experts-xdr" target="_blank" rel="noopener"&gt;Microsoft Defender Experts for XDR&lt;/A&gt; is a managed extended detection and response (MXDR) service that triages, investigates, and responds to incidents for you to help stop cyberattackers and prevent future compromise. Defender Experts for XDR delivers human expertise to security teams quickly to help address coverage gaps and augment their overall security operations. The documentation links below provide more information on the service, requirements, and FAQs:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/dex-xdr-overview?view=o365-worldwide" target="_blank" rel="noopener"&gt;What is Microsoft Defender Experts for XDR offering | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/before-you-begin-xdr?view=o365-worldwide" target="_blank" rel="noopener"&gt;Before you begin using Defender Experts for XDR | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/get-started-xdr?view=o365-worldwide" target="_blank" rel="noopener"&gt;Get started with Microsoft Defender Experts for XDR | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/start-using-mdex-xdr?view=o365-worldwide" target="_blank" rel="noopener"&gt;How to use the Microsoft Defender Experts for XDR service | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/communicate-defender-experts-xdr?view=o365-worldwide" target="_blank" rel="noopener"&gt;Communicating with Microsoft Defender Experts | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/auditing?view=o365-worldwide" target="_blank" rel="noopener"&gt;How to search the audit logs for actions performed by Defender Experts | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/additional-information-xdr?view=o365-worldwide" target="_blank" rel="noopener"&gt;Additional information related to Defender Experts for XDR | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/frequently-asked-questions?view=o365-worldwide" target="_blank" rel="noopener"&gt;FAQs related to Microsoft Defender Experts for XDR | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/third-party-enrichment-defender-experts" target="_blank" rel="noopener"&gt;What is third-party network signal enrichment in Microsoft Defender Experts for XDR?| Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender Experts for Hunting&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/security/business/services/microsoft-defender-experts-hunting" target="_blank" rel="noopener"&gt;Microsoft Defender Experts for Hunting&lt;/A&gt; , which is included with Defender Experts for XDR or offered separately, proactively looks for threats 24/7/365 using unparalleled visibility of cross-domain telemetry and leading threat intelligence to extend your team’s threat hunting capabilities and improve overall SOC response. The documentation links below provide more information on the service, requirements, and reporting:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/defender-experts-for-hunting?view=o365-worldwide" target="_blank" rel="noopener"&gt;What is Microsoft Defender Experts for Hunting offering | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/before-you-begin-defender-experts?view=o365-worldwide" target="_blank" rel="noopener"&gt;Key infrastructure requirements for Microsoft Defender Experts for Hunting | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/onboarding-defender-experts-for-hunting?view=o365-worldwide" target="_blank" rel="noopener"&gt;How to subscribe to Microsoft Defender Experts for Hunting | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/defender-experts-report?view=o365-worldwide" target="_blank" rel="noopener"&gt;Understand the Defender Experts for Hunting report in Microsoft Defender XDR | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Ninja Show episodes featuring Defender Experts&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Season 7, Episode 8:&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=lMugbEvToOI&amp;amp;t=2s" target="_blank" rel="noopener"&gt;Day in the life of a SOC analyst&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Season 5, Episode 5:&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=phEEbKFK8_k&amp;amp;t=1s" target="_blank" rel="noopener"&gt;Improve your security posture with Microsoft Defender Experts for XDR&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Season 3, Episode 4:&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=4i60ISNaEik" target="_blank" rel="noopener"&gt;Defender Experts for Hunting Overview&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;On-demand event sessions and webinars featuring Defender Experts&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;RSAC 2025&amp;nbsp;&lt;STRONG&gt;(&lt;EM&gt;NEW&lt;/EM&gt;)&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=AcqKDTVoxsQ&amp;amp;t=1s" target="_blank" rel="noopener"&gt;Bolser your SOC with Microsoft's Managed Extended Detection and Response (MXDR)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Webinar:&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=ViRwkiROTOI" target="_blank" rel="noopener"&gt;MDR and Generative AI: Better Together - A conversation with guest speaker Jeff Pollard&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Defender Experts videos&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Explainer Video:&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=4jblPNlhGpc" target="_blank" rel="noopener"&gt;Microsoft Defender Experts for XDR&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Explainer Video (&lt;STRONG&gt;&lt;EM&gt;NEW&lt;/EM&gt;&lt;/STRONG&gt;):&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=iqlxXf6JeQg" target="_blank" rel="noopener"&gt;Microsoft Defender Experts for Hunting&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Video:&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=DoTEkrvQs-Y" target="_blank" rel="noopener"&gt;Adversary in the Middle Hunting Story&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Video:&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=eLEXPZ1mUwQ" target="_blank" rel="noopener"&gt;Get started with onboarding | Microsoft Defender Experts for XDR&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Video:&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=fYzquW2hE5I" target="_blank" rel="noopener"&gt;Get started with managed response | Microsoft Defender Experts for XDR&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Video:&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=Ymm6g_Eis34" target="_blank" rel="noopener"&gt;Get started with reporting | Microsoft Defender Experts for XDR&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Deep dives from the Microsoft Security blog featuring Defender Experts&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2024/02/08/microsoft-copilot-for-security-provides-immediate-impact-for-the-microsoft-defender-experts-team/" target="_blank" rel="noopener"&gt;Microsoft Copilot for Security provides immediate impact for the Microsoft Defender Experts team&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2023/06/08/detecting-and-mitigating-a-multi-stage-aitm-phishing-and-bec-campaign/" target="_blank" rel="noopener"&gt;Detecting and mitigating a multi-stage AiTM phishing and BEC campaign&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2022/08/24/looking-for-the-sliver-lining-hunting-for-emerging-command-and-control-frameworks/" target="_blank" rel="noopener"&gt;Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2021/12/02/structured-threat-hunting-one-way-microsoft-threat-experts-prioritizes-customer-defense/" target="_blank" rel="noopener"&gt;One way Microsoft Defender Experts for Hunting prioritizes customer defense&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/phish-click-breach-hunting-for-a-sophisticated-cyber-attack/ba-p/4267916" target="_blank" rel="noopener"&gt;Phish, Click, Breach: Hunting for a Sophisticated Cyber Attack&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Podcasts&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Microsoft Security Insights Show Episode 218:&amp;nbsp;&lt;A href="https://www.microsoftsecurityinsights.com/p/microsoft-security-insights-show-7a1" target="_blank" rel="noopener"&gt;Michael Melone&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Microsoft Security insights Show Episode 198:&amp;nbsp;&lt;A href="https://www.microsoftsecurityinsights.com/p/microsoft-security-insights-show-b37" target="_blank" rel="noopener"&gt;Raae Wolfram&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Microsoft Security Insights Show Episode 181:&amp;nbsp;&lt;A href="https://microsoftsecurityinsights.com/microsoft-security-insights-show-episode-181-brian-hooper-phoebe-rogers" target="_blank" rel="noopener"&gt;Brian Hooper and Phoebe Rogers: A day in the life of a Defender Experts for XDR analyst&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Microsoft Security Insights Show Episode 168:&amp;nbsp;&lt;A href="https://microsoftsecurityinsights.com/microsoft-security-insights-show-episode-168-steve-lee-defender-experts" target="_blank" rel="noopener"&gt;Steve Lee, Defender Experts&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To learn more about Defender Experts,&amp;nbsp;&lt;A href="https://aka.ms/IWantDefenderExperts" target="_blank" rel="noopener"&gt;click here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 15:56:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/welcome-to-the-microsoft-defender-experts-ninja-hub/ba-p/4442210</guid>
      <dc:creator>henryyan</dc:creator>
      <dc:date>2025-08-18T15:56:51Z</dc:date>
    </item>
    <item>
      <title>How Microsoft Defender Experts uses AI to cut through the noise</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/how-microsoft-defender-experts-uses-ai-to-cut-through-the-noise/ba-p/4443601</link>
      <description>&lt;P&gt;&lt;A href="https://www.microsoft.com/security/business/services/microsoft-defender-experts-xdr" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt; Defender Experts&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; manages and investigates incidents for some of the world’s largest organizations. We understand the challenges facing our customers and are always looking for ways to respond quicker and scale our services to meet their needs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="none"&gt;Teaching AI to think like a security expert&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We're leveraging AI to help Defender Experts expand our services and respond even faster to threats facing our customers.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;AI-based incident classification&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;allows us to &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;filter noise up front&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;without compromising on detecting real threats. This AI-based capability is trained by security experts, built for precision, and designed to scale and act at speed.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Our approach doesn't just rely on static rules or traditional filtering. Instead, our AI is powered by insights from hundreds of thousands of real investigations conducted by Defender Experts security analysts. These investigations form a goldmine of expert knowledge—how analysts think, what signals they trust, and how they separate benign and false positives from true threats.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We use historical intelligence to evaluate each new incident. AI-based incident classification looks at various signals, such as evidence, tenant details, context from IOCs, and TI information. It assigns a similarity score based on those signals. By using a similarity algorithm, the AI-based system compares each new incident to known outcomes from the past—deciding whether it closely resembles true positives, false positives, or is benign.&amp;nbsp;&amp;nbsp; At a certain threshold, it confidently assigns the grade.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If the pattern matches past false positives, the system de-grades the incident as noise. If the pattern looks similar to a known higher-risk threat, it escalates it faster. This helps us focus first on what matters most— true, actionable threats, which results in quicker response times for our customers.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="none"&gt;Human-centric and safe&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We know that trust is everything in cybersecurity. So even though AI helps us filter noise, we've built guardrails to make sure no real threats are missed:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Tiered decisioning: Incidents that are classified as noise are reviewed by Defender Expert analysts to ensure they match the classification and other criteria for noise.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Feedback loops: For continuous learning, anything classified as noise is sent to an analyst for validation so that there are no accidental misses of true threats. The feedback from them continuously improves the system.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Transparency: classification decisions are visible, helping analysts understand why something is marked as noise or not.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This approach strikes the right balance. AI does the heavy lifting up front, and our human security experts remain firmly in control of what is investigated.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="none"&gt;Quicker response for our customers&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;AI-based incident classification in Defender Experts:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;50% of noise is automatically triaged by AI-based incident classification with 100% precision&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Our experts respond faster to meaningful threats to our customer’s environment.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;“We no longer waste time chasing dead ends. The system helps us focus on what truly matters and our customers appreciate how quickly we can respond.” — &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Defender Experts Tier2 Analyst&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="none"&gt;What’s next?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We’re continuing to refine this system with more granular risk scoring per entity, deeper tenant-based similarity correlation, IOC based weightage, and additional real-time feedback from Defender Experts analysts.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="none"&gt;Final thoughts&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;AI alone isn’t the answer—but &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;AI guided by experts&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; is a force multiplier. With AI-based incident classification, Defender Experts is showing what the future of SOCs can look like: faster, smarter, safer, and scalable.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;AI-based classification has helped reduce 50% of the noise from the analyst queue with 100% accuracy, saving analyst time so they can focus on what matters most.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If you're a Defender Experts customer, you’re already seeing the benefit of quicker response times to true security threats.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If you're a security leader struggling with alert overload, Microsoft Defender Experts for XDR, Microsoft’s MXDR (managed extended detection and response) service, can deliver around the clock, expert-led protection.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For more information, please visit &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/services/microsoft-defender-experts-xdr?msockid=13c014a69e526bdc33a2001f9ff56a60" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Defender Experts for XDR | Microsoft Security&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2025 17:33:20 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/how-microsoft-defender-experts-uses-ai-to-cut-through-the-noise/ba-p/4443601</guid>
      <dc:creator>ShailyGoel</dc:creator>
      <dc:date>2025-08-14T17:33:20Z</dc:date>
    </item>
  </channel>
</rss>

