You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This meta has been created to capture research and analysis on recent public intelligence from Microsoft on Midnight Blizzard (aka APT29). Referenced below, several TTPs have been analyzed and released that detail abusing native Azure services such as Graph, authorization and authentication workflows with OAuth, entity accounts in Entra ID and much more.
The goal of this meta should be to assess the existing intelligence shared and publicly related information enough to setup proper infrastructure, conduct emulation and identify candid SIEM detection rule capabilities.
This may rely on integrations such as Azure and O365 for log ingestion and visibility.
Estimated Time to Complete
~2 sprint cycles (4 weeks)
Potential Blockers
No initial blockers but this may be subject to change as we explore.
Tasklist
The content you are editing has changed. Please copy your edits and refresh the page.
Parent Epic (If Applicable)
Meta Summary
This meta has been created to capture research and analysis on recent public intelligence from Microsoft on Midnight Blizzard (aka APT29). Referenced below, several TTPs have been analyzed and released that detail abusing native Azure services such as Graph, authorization and authentication workflows with OAuth, entity accounts in Entra ID and much more.
The goal of this meta should be to assess the existing intelligence shared and publicly related information enough to setup proper infrastructure, conduct emulation and identify candid SIEM detection rule capabilities.
This may rely on integrations such as Azure and O365 for log ingestion and visibility.
Estimated Time to Complete
~2 sprint cycles (4 weeks)
Potential Blockers
No initial blockers but this may be subject to change as we explore.
Tasklist
Meta Tasks
While incomplete, I have started a task list of activity we should attempt to understand, emulate and test monitoring capabilities on.
Rule Coverage Tasks
Resources / References
The text was updated successfully, but these errors were encountered: