What the Bad Guys Did to Gain Access
To better prepare for similar attacks, state and local agencies must fully understand these adversaries’ tactics:
- Constantly searching for administrative accounts that are inadequately protected or not disabled
- Initial access techniques. Gathering victim identity information and credentials
- Connecting to a virtual machine using the victim’s VPN to blend in with legitimate traffic and evade detection
- Credential access. Obtain user account credentials, likely from a virtualized SharePoint server where they were stored locally
- Privilege escalation. Using privileges of the compromised account synced to on-premises networks and Azure AD
- Executing Lightweight Directory Access Protocol queries of AD via a virtual machine connection, collecting user and host information as well as trust relationship information, and authenticating to services
One mistake can result in potentially devastating consequences. Failing to immediately remove a privileged account from the environment left a door open to the threat. With this information, a bad actor could take advantage of the unique nature of Azure AD to gain access throughout the network.
19.2M
The total number of U.S. state and local government employees in 2022
Source: Source: statistica.com, “Total number of government employees in the United States from 1982 to 2022,” Nov. 3, 2023
This is because, by default, all users of Azure AD can register and manage every aspect of the applications they create. This includes determining and approving what organizational data and services the app can access. Such default settings can enable a criminal to access sensitive information, move laterally in the network and escalate privileges to conduct malicious actions.
READ MORE: Bad actors seek payday through ransomware attacks.
What the Good Guys Can Do to Protect Access
Once agencies and their network defenders are fully aware of how the bad guys work, CISA and MS-ISAC encourage security groups to fortify against similar attacks. Mitigation is largely focused on protecting credentials (especially for privileged accounts) and reducing the attack surface.
Administrative accounts:
- Review current administrative accounts to make sure each is really needed. Remove any accounts deemed no longer necessary.
- Restrict the use of multiple admin accounts by a single user.
- Create separate admin accounts for on-premises and Azure environments.
- Implement least-privilege principles.
- Use phishing-resistant multifactor authentication.
- Establish policies and procedures for prompt removal of unnecessary accounts and groups.
Passwords:
- Implement strong password management alongside other attribute-based information, such as time of access, user history and geolocation.
- Require complex passwords for all users — and enforce as passwords expire.
- Store credentials in a vault or other privileged account management solution.
- For products that come with default passwords, require vendors to provide a plan for eliminating them.
Tenant settings:
- Evaluate current user permissions in the Azure tenant to restrict potentially harmful permissions.
- Only allow admins to create tenants.
- Ensure that only admins can access the Azure AD portal.
- Use the Secure Cloud Business Applications assessment tool to verify that tenant configurations conform to the security configuration baseline.
- Use tools that identify attack paths and shut them down before they are exploited.
- Review the security recommendations from Microsoft Defender.
EXPLORE: Governments coordinate solutions for zero-trust defenses.
How Government Agencies Can Reduce Their Attack Surface
All of those mitigations help protect organizations by establishing safeguards that prevent and deter threat actors from accessing privileged accounts, escalating privileges and accessing further information. Additionally, it is important to ensure that not only the on-premises environment but also any cloud-based environments such as Azure are adequately protected and monitored.
Attack surface:
- Maintain a robust asset management policy.
- Follow routine patching cycles.
- Do not allow personal devices to connect to the network.
- Collect security-focused logs.
- Enable complete coverage of tools across the environment for thorough analysis of anomalous activity and remediation of potential vulnerabilities.
These mitigations, along with network segmentation, reduce the attack surface available to bad actors, and allow for early detection and prompt response to attempts to wreak havoc. Vendor recommendations from CISA and MS-ISAC include prioritizing security by default configurations and immediately mitigating products that have not been patched in accordance with CISA’s Known Exploited Vulnerabilities catalog.
All agencies are encouraged to adopt the CISA Cross-Sector Cybersecurity Performance Goals, a set of cybersecurity practices directed at reducing risk. These help organizations prioritize their investments and leverage scarce resources to focus on essential actions that have the biggest impact on security.
Finally, agencies are encouraged to exercise, test and validate their security programs against threat behaviors mapped to the MITRE ATT&CK Matrix for Enterprise framework.