Topics
Last updated
Last updated
Abuse Hybrid workers using Runbooks in Automation accounts to move from Azure tenant to on-prem machines.
Execute lateral movement from GitHub to Azure tenant by abusing GitHub actions and deployment to a Function App.
Execute Pass-The-PRT attack to replay PRT cookie of a user to access cloud apps that the user can access.
Abuse Intune to execute commands on on-prem machines.
Perform attacks against applications using Application proxy to execute cloud-to-onprem lateral movement.
Gain a deep understanding of how Hybrid Identity models (PHS, PTA and Federation) can be abused to execute onprem-to-cloud lateral movement.
Hybrid environments that link cloud resources with on-premises infrastructure have become increasingly common in today's IT landscapes. However, these environments are vulnerable to various cybersecurity threats that exploit the connections between cloud and on-prem infrastructure. Understanding these threats is critical for cybersecurity professionals tasked with defending these complex systems.
Abuse of Hybrid Workers for Tenant Migration: Malicious actors can exploit hybrid workers in automation accounts to migrate workloads from an Azure tenant to on-premises machines without authorization. This can lead to unauthorized access to sensitive data.
Lateral Movement via GitHub and Azure: By abusing GitHub actions and deployments to a Function App, attackers can move laterally from GitHub into an Azure tenant. This attack vector highlights the risks associated with integrating source control and CI/CD processes with cloud environments.
Pass-The-PRT Attack: The Pass-The-PRT (Primary Refresh Token) attack involves replaying a user's PRT cookie to gain access to cloud applications that the user is authorized to access. This attack can bypass multifactor authentication, allowing unauthorized access to sensitive cloud resources.
Intune Command Execution: The abuse of Intune for command execution on on-premises machines presents another vector for attackers. This can lead to the execution of malicious commands within an organization’s internal network, exploiting the trust relationship between cloud services and on-premises devices.
Application Proxy Attacks: By targeting applications that use an application proxy for cloud-to-on-premises communication, attackers can perform lateral movement from cloud environments into on-premises networks. This underscores the need for secure configurations and monitoring of application proxies.
Hybrid Identity Model Exploits: Hybrid Identity models, including PHS (Password Hash Sync), PTA (Pass-through Authentication), and Federation, can be abused for on-premises to cloud lateral movement. Understanding the security implications of these identity models is crucial for protecting against such attacks.
To defend against these threats, organizations should:
Implement stringent access controls and monitor for unusual activities, especially in configurations that bridge cloud and on-premises environments.
Secure integration points between development environments (like GitHub) and cloud services to prevent unauthorized access and deployments.
Use multi-factor authentication and conditional access policies to minimize the risk of token replay attacks.
Regularly audit and secure management tools such as Intune to prevent unauthorized command execution.
Ensure secure configurations of application proxies and closely monitor these connections for signs of compromise.
Understand and securely implement hybrid identity models, reducing the attack surface for lateral movement.
By staying informed of these potential attack vectors and implementing robust security measures, organizations can significantly reduce their risk in hybrid cloud environments.