Bhabesh

1K posts

Bhabesh

Bhabesh

@bh4b3sh

Cybersecurity Analyst | Detection Engineer | Threat Hunter #Microsoft365 #EntraID #Azure #Windows #AD #AWS #Kubernetes

Katılım Ocak 2020
514 Takip Edilen457 Takipçiler
Bhabesh retweetledi
Matt Zorich
Matt Zorich@reprise_99·
In real world incidents, we often see attackers compromise on-premises environments and then pivot into the cloud. We understand most large organizations, and even smaller ones, still have a significant on-premises identity footprint. To help you protect M365 from on-premises compromise we have written specific guidance to help you - learn.microsoft.com/en-us/entra/ar…
English
3
33
165
18.6K
Bhabesh
Bhabesh@bh4b3sh·
Why is the appRoles empty when trying to list Service Principal info? Even servicePrincipals/{Id}/appRoleAssignedTo returns empty 🤔 Any help will be much appreciated. cc. @fabian_bader @NathanMcNulty
Bhabesh tweet mediaBhabesh tweet mediaBhabesh tweet media
English
1
0
2
493
Bhabesh
Bhabesh@bh4b3sh·
@NathanMcNulty Great! And... still no SearchQueryInitiated* MS doing MS stuff.
English
1
0
1
77
Nathan McNulty
Nathan McNulty@NathanMcNulty·
@bh4b3sh I did a comparison of all the record types available vs the default set later in the thread, but here's the image But the usefulness of some of these additional records is highly dependent on the incident, and likely more rare which is probably why they aren't enabled by default
Nathan McNulty tweet media
English
2
0
1
135
Nathan McNulty
Nathan McNulty@NathanMcNulty·
You likely aren't collecting all available events to the Unified Audit Log First, not all events are enabled or retained optimally. Consider creating this policy in the Purview portal (leave users and record types blank to collect everything). Retention is based on license...
Nathan McNulty tweet media
English
8
38
231
24.7K
Bhabesh retweetledi
blackorbird
blackorbird@blackorbird·
#Lazarus Operation Traffic sourced from DPRK IPs, masked via VPNs/proxies, routed through Oculus nodes (Hasan, Russia) to C2; multi-hop architecture ensures full-chain anonymity & evasion. securityscorecard.com/blog/operation…
blackorbird tweet media
blackorbird@blackorbird

#Lazarus via LinkedIn Operation blogs.jpcert.or.jp/ja/2025/01/ini… Operation 99: North Korea’s Cyber Assault on Software Developers securityscorecard.com/blog/operation…

English
1
44
161
21.3K
Bhabesh
Bhabesh@bh4b3sh·
Just noticed, all the permissions from the Directory Synchronization Accounts role were replaced with a new one back in August👀 This locks down attack paths shown by @fabian_bader which could result in privesc to Global Admin by taking control of a privileged service principal
Bhabesh tweet mediaBhabesh tweet mediaBhabesh tweet mediaBhabesh tweet media
English
1
3
16
2K
Bhabesh
Bhabesh@bh4b3sh·
Hey @_wald0, do you know if it is possible to access Exchange Online EWS activity log by customers? PS: What an excellent breakdown of the Microsoft breach with nice illustrations!
Andy Robbins@_wald0

In this blog post: ● My analysis of the Midnight Blizzard breach affecting Microsoft ● Step-by-step explanation of the attack path the adversary took ● Practical, free steps ANY Azure admin can take to protect themselves posts.specterops.io/microsoft-brea…

English
0
0
0
94
birdd
birdd@0xbirdd·
@bh4b3sh @fabian_bader MSFT also wrote about this and said they need to harden the sync account more, theres surely something up if you ask me. Personally I dislike SSPR to OnPremise since it opens up more holes than it does good - interestingly enough MSFT gives you + points on the Secure Score
English
1
0
1
131
Bhabesh
Bhabesh@bh4b3sh·
@reprise_99 Vendor: We don't need GA Blue Team: yay! Vendor: Give us RoleManagement.ReadWrite[.]Directory instead Blue Team: 😶
English
0
0
3
79
Matt Zorich
Matt Zorich@reprise_99·
The blue team when a vendor asks for their application to be added to domain and global admin
English
9
29
257
19.9K
Bhabesh retweetledi
Adam Chester 🏴‍☠️
This hack is brilliant, APT28 hopping into a target environment over wifi by compromising neighbouring companies and finding a dual-homed host within range. volexity.com/blog/2024/11/2… And yet... they got caught doing this!
Adam Chester 🏴‍☠️ tweet media
English
21
101
624
88.8K
Bhabesh retweetledi
Kostas
Kostas@Kostastsale·
🚨EDR Telemetry website is live! 🥳 I hope this makes it even easier for folks to compare the telemetry of EDR vendors and visualize their visibility gaps 🙂 ‣ Website🔗edr-telemetry.com ‣ GitHub 🔗github.com/tsale/edr-tele… **Telemetry results reflect the most recent updates from the EDR Telemetry project.
Kostas tweet media
Kostas@Kostastsale

I created the first draft of a website for the EDR telemetry project to help people quickly compare vendor telemetry visibility. What do you think about it? Are there any specific features you want to see for the website? Built with ChatGPT 4o with canvas (wanted to test it out😂) EDR Telemetry project 🔗: github.com/tsale/EDR-Tele…

English
19
281
893
127.1K
Bhabesh
Bhabesh@bh4b3sh·
@fabian_bader @reprise_99 Thankfully I have it enabled. But the AccountDomain in IdentityInfo stores the DNSDomain and not the NTDomain (🪟), so it cannot be used in the join. That leaves me with only username and SID with the latter not present in select few EIDs like 4648, 4769, 4776, 4778, etc.
English
0
0
0
42
Fabian Bader
Fabian Bader@fabian_bader·
@bh4b3sh @reprise_99 If this is the case I would recommend to enable UEBA entity enrichment in Sentinel and use the IdentityInfo table to get the UPN and/or object ID
English
1
0
1
229
Bhabesh
Bhabesh@bh4b3sh·
Since Windows event logs lack user's UPN, Sentinel is creating two Account entities for the same user across Windows, O365 & Okta incidents. Is my conclusion correct? If yes then, one solution I think is enriching the 🪟 event logs to have UPN. cc. @fabian_bader @reprise_99
Bhabesh tweet media
English
1
0
2
1K
Fabian Bader
Fabian Bader@fabian_bader·
@bh4b3sh @reprise_99 Just to clarify, this is the result of two incidents that were correlated by XDR because Sentinel is onboarded to the unified xdr experience?
English
2
0
1
262