Although Managed Identities offer security benefits, they also operate on trust models that can be misused.
Advanced detection methods to uncover abuse of Azure Managed Identities have been developed, shedding light on a growing security concern in cloud environments.
According to research by Hunters, techniques to detect malicious Managed Identity activity were determined, emphasising behaviour-based threat hunting, rather than just identifying their existence.
While Managed Identities simplify authentication by removing static credentials, they also create new risks, as attackers can exploit them to escalate privileges and access sensitive data across Azure services.
The paper introduces twelve detection queries, including one that identifies abnormal Microsoft Graph enumeration using compromised Managed Identities, to expose behaviours indicative of reconnaissance and lateral movement. These techniques rely on pattern analysis, using Snowflake SQL to flag suspicious API call volumes and endpoints.
Hunters’ researchers highlight that though Managed Identities offer security benefits, they also operate on trust models that can be misused.
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.