Skip to content

Commit

Permalink
Merge pull request #2440 from splunk/appinpect_azure
Browse files Browse the repository at this point in the history
formatting error
  • Loading branch information
patel-bhavin authored Nov 2, 2022
2 parents d8f8c21 + dba61a4 commit 73e927e
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 14 deletions.
8 changes: 1 addition & 7 deletions stories/azure_active_directory_account_takeover.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,13 +5,7 @@ date: '2022-07-14'
author: Mauricio Velazco, Splunk
description: Monitor for activities and techniques associated with Account Takover
attacks against Azure Active Directory tenants.
narrative: 'Azure Active Directory (Azure AD) is Microsofts enterprise cloud-based identity and access management (IAM) service. Azure AD is the backbone of most of Azure
services like Office 365. It can sync with on-premise Active Directory environments and provide authentication to other cloud-based systems via the OAuth protocol.
According to Microsoft, Azure AD manages more than 1.2 billion identities and processes over 8 billion authentications per day.\
Account Takeover (ATO) is an attack whereby cybercriminals gain unauthorized access to online accounts by using different techniques like brute force, social engineering,
phishing & spear phishing, credential stuffing, etc. By posing as the real user, cyber-criminals can change account details, send out phishing emails, steal financial information or sensitive data,
or use any stolen information to access further accounts within the organization.\
This analytic storic groups detections that can help security operations teams identify the potential compromise of Azure Active Directory accounts.'
narrative: 'Azure Active Directory (Azure AD) is Microsofts enterprise cloud-based identity and access management (IAM) service. Azure AD is the backbone of most of Azure services like Office 365. It can sync with on-premise Active Directory environments and provide authentication to other cloud-based systems via the OAuth protocol. According to Microsoft, Azure AD manages more than 1.2 billion identities and processes over 8 billion authentications per day. Account Takeover (ATO) is an attack whereby cybercriminals gain unauthorized access to online accounts by using different techniques like brute force, social engineering, phishing & spear phishing, credential stuffing, etc. By posing as the real user, cyber-criminals can change account details, send out phishing emails, steal financial information or sensitive data, or use any stolen information to access further accounts within the organization. This analytic storic groups detections that can help security operations teams identify the potential compromise of Azure Active Directory accounts.'
references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis
- https://azure.microsoft.com/en-us/services/active-directory/#overview
Expand Down
9 changes: 2 additions & 7 deletions stories/gcp_account_takeover.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,16 +5,11 @@ date: '2022-10-12'
author: Mauricio Velazco, Bhavin Patel, Splunk
description: Monitor for activities and techniques associated with Account Takover
attacks against Google Cloud Platform tenants.
narrative: '
Account Takeover (ATO) is an attack whereby cybercriminals gain unauthorized access to online accounts by using different techniques like brute force, social engineering,
phishing & spear phishing, credential stuffing, etc. By posing as the real user, cyber-criminals can change account details, send out phishing emails, steal financial information or sensitive data,
or use any stolen information to access further accounts within the organization.\
This analytic storic groups detections that can help security operations teams identify the potential compromise of Azure Active Directory accounts.'
narrative: 'Account Takeover (ATO) is an attack whereby cybercriminals gain unauthorized access to online accounts by using different techniques like brute force, social engineering,
phishing & spear phishing, credential stuffing, etc. By posing as the real user, cyber-criminals can change account details, send out phishing emails, steal financial information or sensitive data, or use any stolen information to access further accounts within the organization. This analytic storic groups detections that can help security operations teams identify the potential compromise of Azure Active Directory accounts.'
references:
- https://cloud.google.com/gcp
- https://cloud.google.com/architecture/identity/overview-google-authentication
-
- https://attack.mitre.org/techniques/T1586/
- https://www.imperva.com/learn/application-security/account-takeover-ato/
- https://www.barracuda.com/glossary/account-takeover
Expand Down

0 comments on commit 73e927e

Please sign in to comment.