Will Oram

402 posts

Will Oram banner
Will Oram

Will Oram

@willoram

Cyber Incident Response Director at @PwC_UK | Tweets about cyber security, ransomware, and identity-based attacks | Opinions my own

London Katılım Ocak 2015
912 Takip Edilen444 Takipçiler
Will Oram retweetledi
Merill Fernando
Merill Fernando@merill·
👋 Folks, I'm super excited to announce the launch of the Microsoft Zero Trust Assessment! I've been working on this project for the past year at Microsoft with an extended team including our security researchers, product feature teams and docs Here's what it does 🧵👇
Merill Fernando tweet media
English
35
167
790
57.5K
Will Oram retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
Reading Microsoft’s new Void Blizzard report, one thing stands out (again): Everything is about credential theft, phishing, and tokens. Initial access comes from buying or stealing creds - often through low-effort phishing. All the real action happens in the cloud, not on endpoints. Gone are the days of multi-stage attacks where you’d see lateral movement, privilege escalation, or fancy malware on file servers. Now it’s just: steal creds, log in to cloud, exfiltrate data, repeat. Detection? Only possible if you have access to expensive cloud logs. No logs, no chance. The perimeter has shifted from endpoints to identity. The detection surface shrank from your whole network down to some logs you might get from your cloud provider if you pay extra. Honestly, not sure if that’s “progress” or just shifting the visibility problem somewhere else.
Florian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet media
Microsoft Threat Intelligence@MsftSecIntel

Microsoft has discovered worldwide cloud abuse activity by new Russia-affiliated threat actor Void Blizzard (LAUNDRY BEAR), whose cyberespionage activity targets gov't, defense, transportation, media, NGO, and healthcare in Europe and North America. msft.it/6011S9JpN

English
21
146
631
88K
Will Oram retweetledi
Kris McConkey
Kris McConkey@smoothimpact·
This is a great summary. We (and by we I mean mostly @willoram) have been using variants of this diagram to describe the inversion of attack paths to identity-based intrusions - a major trend in our incident response cases over the past year.
Kris McConkey tweet media
Florian Roth ⚡️@cyb3rops

In the past, you had to: phish a user, drop malware, escalate privileges, pivot to servers, evade EDR, dump creds, move laterally, exfiltrate quietly, clean up, leave a backdoor. Today, you just: phish a user, steal an OAuth token, access everything from anywhere. Cloud breaches aren’t hacks. They’re logins.

English
3
33
133
16.1K
Will Oram retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
In the past, you had to: phish a user, drop malware, escalate privileges, pivot to servers, evade EDR, dump creds, move laterally, exfiltrate quietly, clean up, leave a backdoor. Today, you just: phish a user, steal an OAuth token, access everything from anywhere. Cloud breaches aren’t hacks. They’re logins.
Florian Roth ⚡️@cyb3rops

We’re seeing a clear trend: attackers are bypassing the endpoint entirely. Not just avoiding traditional EDR-monitored systems by pivoting to embedded and edge devices, but now also operating purely in the cloud. No shell, no malware, no persistence on the endpoint. Just an OAuth token and full access to whatever’s in the victim’s Microsoft 365, Google Workspace, or AWS console. It’s a complete inversion of how things used to be. The endpoint, once the weakest link, is now usually the most monitored, most policy-enforced part of the infrastructure. You’ve got EDRs, SIEM integration, automation, threat hunting - the full stack. But attackers don’t need to touch it anymore. Instead, they go after the new soft spots: - Cloud platforms, where logging is limited, expensive, or off by default - Network devices and appliances, which are practically blind spots - obscure OSes, no EDRs, hard to monitor, hard to forensicate. - Embedded systems and IoT junk that no one really knows how to secure, but that sit in critical network paths. Cloud especially is a mess: - Logging tiers cost extra and the good stuff is behind paywalls. - Detection content is lacking, both from vendors and the community. - You don’t get memory dumps or full control like you do on endpoints. - You’re at the mercy of the provider when it comes to visibility and response. And that’s the shift: attackers aren’t hacking computers anymore. They’re hacking trust relationships, identities, and APIs. The whole idea of detection and response needs to evolve with that. Otherwise, we’re securing the hell out of endpoints while attackers happily fish through mailboxes and cloud shares from halfway across the planet.

English
25
173
761
79.3K
Will Oram retweetledi
John Savill
John Savill@NTFAQGuy·
Credential and token theft are impacting nearly every organization. In this video I look at what we can do to try and protect against these threats. youtu.be/toytJf1rmV4 00:00 - Introduction 00:49 - Credential protection 05:46 - Authentication strengths 07:32 - Protection for strong authentication method registration 08:54 - Additional protections 11:56 - Shift to token theft 12:19 - Tokens we get 13:24 - Secrets on the machine 15:45 - Primary Refresh Token 17:42 - Session Key 19:21 - Refresh and Access Tokens 21:51 - Token theft 24:02 - Protections 24:22 - Entra Internet Access 26:13 - Machine management 29:21 - Token binding 32:20 - Proof of Possession 37:50 - Token brokers and MSAL 39:41 - Requiring token binding 41:59 - Demonstrated Proof of Possession standard 45:13 - Detection 45:42 - Continuous Access Evaluation 46:39 - Identity Protection 48:16 - Summary 51:35 - Close #security #identity #entraid #microsoft #oidc #oauth2 #microsoftdefender #azure #cloud #entra
YouTube video
YouTube
English
0
45
171
13.5K
Will Oram retweetledi
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft Incident Response provides a response playbook to empower defenders in tackling the challenges posed by Octo Tempest and evicting the threat actor from cloud and on-premises environments: msft.it/6016Y2DQu
English
1
96
229
36.4K
Will Oram retweetledi
Will Oram retweetledi
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
The cost to run a company that has all the right cyber security tools and staff is absolutely obscene. It’s hard to describe the numbers I’ve seen. Even saying this is a gray area. But it is incredible headcount and spend. Non-keystone companies have no chance in normal paradigm.
English
37
66
803
107.1K
Will Oram retweetledi
TrustedSec
TrustedSec@TrustedSec·
For almost a year, invisible password spraying could be performed against any #Azure tenant due to a vulnerability in #MicrosoftGraph. In our latest blog, @nyxgeek walks us through how these attacks could have been carried out. Read it now! hubs.la/Q02vpTlN0
English
3
146
319
91.7K
Will Oram retweetledi
FalconForce Official
FalconForce Official@falconforceteam·
We are proud to finally share some great research by Arnau Ortega on a 1-click #Azure tenant takeover attack. You can read all about it in our latest blog post. It explains how we could take over any Azure tenant; just by clicking one legitimate link 😨 falconforce.nl/arbitrary-1-cl…
FalconForce Official tweet media
English
3
60
135
29K
Will Oram retweetledi
NCSC UK
NCSC UK@NCSC·
We’re delighted to announce that Richard Horne has been appointed as the NCSC’s new CEO and will take over in the autumn. Richard will join us from PwC UK, where he currently chairs the Cyber Security Practice. More details here ⬇️ ncsc.gov.uk/news/ncsc-anno…
English
8
28
86
57.4K
Will Oram retweetledi
Matt Zorich
Matt Zorich@reprise_99·
We are often engaged with organizations that have lost complete control of their Microsoft Entra ID tenant, I wrote a comprehensive blog post on lessons learned from real world engagements to try to help reduce the risk of the same happening to you microsoft.com/en-us/security…
English
11
161
520
70.7K
Will Oram retweetledi
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
The financially motivated threat actor tracked by Microsoft as Octo Tempest, whose evolving campaigns leverage tradecraft not seen in typical threat models, represents a growing concern for organizations. Get TTPs and protection info: msft.it/60129Lhkw
English
3
156
303
140.7K
Will Oram retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
I love this brave new world where a single leaked or stolen token can significantly impact cloud service providers, their customers, and even their customers' clients #Okta #TokenBinding #DuckingTokens
Florian Roth ⚡️ tweet media
English
13
94
387
44.9K
Will Oram retweetledi
Matt Zorich
Matt Zorich@reprise_99·
If you need some help tracking down resources, links, blog posts etc to help address these issues, should you have them in environments you own or manage, I put together a list of the resources I usually share with customers during engagements - github.com/reprise99/mddr…
Matt Zorich@reprise_99

This table in the Microsoft Digital Defense Report is always fascinating, these stats are taken from DART engagements and other IR teams, it shows the common issues seen across our customers. Brilliance in the basics isn't easy, but worth it. Full report - aka.ms/mddr

English
1
41
160
28.5K
Will Oram retweetledi
Nathan McNulty
Nathan McNulty@NathanMcNulty·
Looks like a good time for a thread on token theft :) Not all MFA is of the same quality, and anything using OTP (SMS, hardware/software tokens) or Push (MS Authenticator, Duo, etc.) is susceptible to AITM attacks That doesn't mean it's useless, but it's becoming less useful
Joosua Santasalo@SantasaloJoosua

Great insights from Microsoft Digital Defense Report 2023. aka.ms/MDDR Major Increase in AITM domains, which also roughly translates to increase in token theft attacks 2022->2023 ~1500-2000 to~7000-9000

English
4
55
199
71.5K
Will Oram retweetledi
Thomas Naunheim
Thomas Naunheim@Thomas_Live·
I can only strongly recommend to read #Microsoft Digital Defense Report 2023. It includes also many interesting insights and statistics on identity attacks. For example, methodology and overview of "return on mitigation" scoring. (1/2) microsoft.com/en-us/security…
Thomas Naunheim tweet mediaThomas Naunheim tweet mediaThomas Naunheim tweet media
English
1
54
195
26.1K
Will Oram retweetledi
Mark Simos
Mark Simos@MarkSimos·
A Zero Trust initiative is effectively working through a backlog of false assumptions of trust (trust debt). Prioritization is critical for most organizations as they have 30+ years of IT decisions made when security wasn't considered/understood/prioritized/etc.
Mark Simos tweet media
English
1
27
102
10.6K
Will Oram retweetledi
1aN0rmus
1aN0rmus@TekDefense·
Beware of LUCR-3! 🚨 Threat actor that overlaps with Scattered Spider, Oktapus, UNC3944, & STORM-0875, they exploit IDPs for initial access & aim to steal IP for extortion. They use victims' tools and evade detection with expertise. @permisosecurity permiso.io/blog/lucr-3-sc…
English
2
69
151
86.8K