Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Meta] Midnight Blizzard (APT29) Azure TTPs Rule Coverage #3412

Open
11 tasks
terrancedejesus opened this issue Jan 30, 2024 · 0 comments
Open
11 tasks

[Meta] Midnight Blizzard (APT29) Azure TTPs Rule Coverage #3412

terrancedejesus opened this issue Jan 30, 2024 · 0 comments

Comments

@terrancedejesus
Copy link
Contributor

Parent Epic (If Applicable)

Meta Summary

This meta has been created to capture research and analysis on recent public intelligence from Microsoft on Midnight Blizzard (aka APT29). Referenced below, several TTPs have been analyzed and released that detail abusing native Azure services such as Graph, authorization and authentication workflows with OAuth, entity accounts in Entra ID and much more.

The goal of this meta should be to assess the existing intelligence shared and publicly related information enough to setup proper infrastructure, conduct emulation and identify candid SIEM detection rule capabilities.

This may rely on integrations such as Azure and O365 for log ingestion and visibility.

Estimated Time to Complete

~2 sprint cycles (4 weeks)

Potential Blockers

No initial blockers but this may be subject to change as we explore.

Tasklist

Meta Tasks

Preview Give feedback

While incomplete, I have started a task list of activity we should attempt to understand, emulate and test monitoring capabilities on.

Rule Coverage Tasks

Preview Give feedback

Resources / References

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants