{"id":21461,"date":"2023-03-13T08:01:07","date_gmt":"2023-03-13T16:01:07","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/03\/13\/news-15192\/"},"modified":"2023-03-13T08:01:07","modified_gmt":"2023-03-13T16:01:07","slug":"news-15192","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/03\/13\/news-15192\/","title":{"rendered":"DEV-1101 enables high-volume AiTM campaigns with open-source phishing kit"},"content":{"rendered":"<p><strong>Credit to Author: Microsoft Security Threat Intelligence| Date: Mon, 13 Mar 2023 16:00:00 +0000<\/strong><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/07\/12\/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud\/\">Adversary-in-the-middle (AiTM)<\/a> phishing kits are part of an increasing trend that is observed supplanting many other less advanced forms of phishing. AiTM phishing is capable of circumventing multifactor authentication (MFA) through reverse-proxy functionality. DEV-1101 is an actor tracked by Microsoft responsible for the development, support, and advertising of several AiTM phishing kits, which other cybercriminals can buy or rent. The availability of such phishing kits for purchase by attackers is part of the industrialization of the cybercriminal economy and lowers the barrier of entry for cybercrime.<\/p>\n<p>DEV-1101 offers an open-source kit that automates setting up and launching phishing activity and provides support services to attackers. The threat actor group began offering their AiTM phishing kit in 2022, and since then has made several enhancements to their kit, such as the capability to manage campaigns from mobile devices, as well as evasion features like CAPTCHA pages. These attributes make the kit attractive to many different actors who have continually put it to use since it became available in May 2022. Actors using this kit have varying motivations and targeting and might target any industry or sector.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/threat-protection\/microsoft-365-defender\">Microsoft 365 Defender<\/a> detects suspicious activities related to AiTM phishing attacks and follow-on activities, such as session cookie theft and attempts to use the stolen cookies to sign in.<\/p>\n<p>In this blog post, we share information on DEV-1101, the tool they offer, and details on related AiTM campaigns. We also share best practices and detection details to further protect organizations from AiTM phishing attacks.<\/p>\n<h2>AiTM tool promotion<\/h2>\n<p>DEV-1101 began advertising their AiTM kit around May 2022 through a Telegram channel and an advertisement in <em>exploit[.]in<\/em>, a popular cybercrime forum. The advertisement describes the AiTM kit as a phishing application written in NodeJS with PHP reverse-proxy capabilities, automated setup, detection evasion through an <em>antibot<\/em> database, management of phishing activity through Telegram bots, and a wide range of ready-made phishing pages mimicking services such as Microsoft Office or Outlook.<\/p>\n<p>On June 12, 2022, DEV-1101 announced that the kit would be open source with a $100 monthly licensing fee. The actor also provided links to additional Telegram channels and a now-defunct GitHub page.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"588\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-1.-DEV-1101-announcement-on-their-AiTM-tool-license-1-1024x588.png\" alt=\"DEV-1101 AiTM tool announcement noting a license as $100 along with contact information and links.\" class=\"wp-image-126424\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-1.-DEV-1101-announcement-on-their-AiTM-tool-license-1-1024x588.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-1.-DEV-1101-announcement-on-their-AiTM-tool-license-1-300x172.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-1.-DEV-1101-announcement-on-their-AiTM-tool-license-1-768x441.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-1.-DEV-1101-announcement-on-their-AiTM-tool-license-1.png 1363w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 1. DEV-1101 announcement on their AiTM tool license<\/figcaption><\/figure>\n<p>In September 2022, DEV-1101 added the ability to manage servers running their kit through a Telegram bot rather than requiring the use of cPanel, further facilitating phishing activities and letting their customers manage campaigns from mobile devices.<\/p>\n<p>DEV-1101 was able to increase the price of their tool multiple times due to the rapid growth of their user base from July through December 2022. This allowed DEV-1101 to dedicate themselves fully to the development and support of their tool. As of this writing, DEV-1101 offers their tool for $300, with VIP licenses at $1,000. Legacy users were permitted to continue purchasing licenses at $200 prior to January 1, 2023.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"659\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-2.-DEV-1101-increased-their-prices-repeatedly-due-to-rapid-growth.-1024x659.png\" alt=\"DEV-1101 announcement noting price increases for regular, VIP, and legacy user licenses. \" class=\"wp-image-126420\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-2.-DEV-1101-increased-their-prices-repeatedly-due-to-rapid-growth.-1024x659.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-2.-DEV-1101-increased-their-prices-repeatedly-due-to-rapid-growth.-300x193.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-2.-DEV-1101-increased-their-prices-repeatedly-due-to-rapid-growth.-768x494.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-2.-DEV-1101-increased-their-prices-repeatedly-due-to-rapid-growth.-200x130.png 200w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-2.-DEV-1101-increased-their-prices-repeatedly-due-to-rapid-growth..png 1164w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 2. DEV-1101 increased their prices repeatedly due to rapid growth.<\/figcaption><\/figure>\n<p>Microsoft observed several high-volume phishing campaigns from various actors using the tool offered by DEV-1101, comprising millions of phishing emails per day. DEV-0928, an actor Microsoft has tracked since September 2022, is one of DEV-1101\u2019s more prominent patrons and was observed launching a phishing campaign involving over one million emails.<\/p>\n<h2>DEV-1101 phishing sequence<\/h2>\n<p>DEV-1101\u2019s many different patrons take different approaches to phishing attacks. The example below is of an initial phishing message from a campaign launched by DEV-0928 using the DEV-1101 phishing kit. Clicking the <em>Open<\/em> button in the email leads to the next step in the sequence.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"984\" height=\"718\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-3.-Malicious-link-shared-in-a-phishing-message-for-an-AiTM-campaign-2.png\" alt=\"Example phishing email from DEV-0928's campaign using a malicious PDF link.\" class=\"wp-image-126443\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-3.-Malicious-link-shared-in-a-phishing-message-for-an-AiTM-campaign-2.png 984w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-3.-Malicious-link-shared-in-a-phishing-message-for-an-AiTM-campaign-2-300x219.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-3.-Malicious-link-shared-in-a-phishing-message-for-an-AiTM-campaign-2-768x560.png 768w\" sizes=\"auto, (max-width: 984px) 100vw, 984px\" \/><figcaption class=\"wp-element-caption\">Figure 3. Malicious link shared in a phishing message for an AiTM campaign.<\/figcaption><\/figure>\n<p>Two different evasions might result from clicking the link in the phishing message. The DEV-1101 kit\u2019s <em>antibot <\/em>functionality might trigger an <em>href<\/em> redirection to a benign page. In this example, the DEV-0928 domain <em>o365987656898087[.]xyz<\/em> redirects to <em>example.com<\/em>:<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-4.-DEV-1101-benign-redirect-response-headers-1024x835.png\" alt=\"DEV-1101 benign redirect response headers \" class=\"wp-image-126426\" width=\"768\" height=\"626\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-4.-DEV-1101-benign-redirect-response-headers-1024x835.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-4.-DEV-1101-benign-redirect-response-headers-300x245.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-4.-DEV-1101-benign-redirect-response-headers-768x626.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-4.-DEV-1101-benign-redirect-response-headers.png 1036w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\">Figure 4. DEV-1101 benign redirect response headers<\/figcaption><\/figure>\n<p>The default redirection domain defined in the source code is <em>example.com<\/em>; however, any actor using the kit may define a different redirection domain.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"390\" height=\"73\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-5.-DEV-1101-benign-redirect-in-source-code.png\" alt=\"DEV-1101 benign redirect in source-code\" class=\"wp-image-126421\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-5.-DEV-1101-benign-redirect-in-source-code.png 390w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-5.-DEV-1101-benign-redirect-in-source-code-300x56.png 300w\" sizes=\"auto, (max-width: 390px) 100vw, 390px\" \/><figcaption class=\"wp-element-caption\">Figure 5. DEV-1101 benign redirect in source-code<\/figcaption><\/figure>\n<p>The kit also allows threat actors to use CAPTCHA to evade detection. Inserting a CAPTCHA page into the phishing sequence could make it more difficult for automated systems to reach the final phishing page, while a human could easily click through to the next page.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"410\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-6.-Evasion-through-captcha-page-2-1024x410.png\" alt=\"CAPTCHA page\" class=\"wp-image-126444\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-6.-Evasion-through-captcha-page-2-1024x410.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-6.-Evasion-through-captcha-page-2-300x120.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-6.-Evasion-through-captcha-page-2-768x308.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-6.-Evasion-through-captcha-page-2-900x360.png 900w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-6.-Evasion-through-captcha-page-2.png 1315w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 6. Evasion through CAPTCHA page<\/figcaption><\/figure>\n<p>While evasion through CAPTCHA was introduced in August 2022, the functionality then required active engagement from DEV-1101\u2019s support to complete the setup for any requesting users. DEV-1101 later added CAPTCHA as a core functionality.<\/p>\n<p>After the evasion pages, a phishing landing page is presented to the target from an actor-controlled host through the phishing actor\u2019s reverse proxy setup:<\/p>\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-7.-Credential-harvester-mimicking-a-Microsoft-sign-in-portal.-1.png\" alt=\"DEV-1101 credential harvester mimicking a Microsoft sign-in portal\" class=\"wp-image-126428\" width=\"752\" height=\"644\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-7.-Credential-harvester-mimicking-a-Microsoft-sign-in-portal.-1.png 1003w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-7.-Credential-harvester-mimicking-a-Microsoft-sign-in-portal.-1-300x257.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-7.-Credential-harvester-mimicking-a-Microsoft-sign-in-portal.-1-768x658.png 768w\" sizes=\"auto, (max-width: 752px) 100vw, 752px\" \/><figcaption class=\"wp-element-caption\">Figure 7. Credential harvester mimicking a Microsoft sign-in portal.<\/figcaption><\/figure>\n<p>At this point, the actor\u2019s server captures credentials entered by the user. If the user has MFA enabled, the AiTM kit continues to function as a proxy between the user and the user\u2019s sign-in service, meaning, as the user completes an MFA sign-in, the server captures the resulting session cookie. The attacker can then bypass MFA with the session cookie and the user\u2019s stolen credentials.<\/p>\n<p>The following diagram illustrates the AiTM phishing attack chain:&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"510\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-8.-AiTM-phishing-attack-diagram-1024x510.png\" alt=\"DEV-1101 attack diagram\" class=\"wp-image-126423\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-8.-AiTM-phishing-attack-diagram-1024x510.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-8.-AiTM-phishing-attack-diagram-300x149.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-8.-AiTM-phishing-attack-diagram-768x382.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-8.-AiTM-phishing-attack-diagram-1536x764.png 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Figure-8.-AiTM-phishing-attack-diagram-2048x1019.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 8. AiTM phishing attack diagram<br \/><\/figcaption><\/figure>\n<p>For additional in-depth information on how AiTM phishing works, refer to the blog, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/07\/12\/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud\/\">From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud<\/a>.<\/p>\n<h2>Mitigating AiTM phishing attacks<\/h2>\n<p>While AiTM phishing attempts to circumvent MFA, MFA implementation remains an essential pillar in identity security and highly effective at stopping a wide variety of threats. MFA is the reason that threat actors developed the AiTM session cookie theft technique in the first place. Organizations are advised to work with their identity provider to ensure security controls like MFA are in place. Microsoft customers can implement <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/azure-active-directory-mfa-multi-factor-authentication\">MFA in Azure AD<\/a> through various methods, such as using the Microsoft Authenticator, FIDO2 security keys, and certificate-based authentication.&nbsp;<\/p>\n<p>Defenders can also complement MFA with the following solutions and best practices to further protect their organizations from such attacks:&nbsp;<\/p>\n<ul>\n<li><strong>Use <\/strong><a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/fundamentals\/concept-fundamentals-security-defaults\"><strong>security defaults<\/strong><\/a> as a baseline set of policies to improve identity security posture. For more granular control, <strong>enable conditional access policies. <\/strong><a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/conditional-access\/overview?ocid=magicti_ta_learndoc\">Conditional access<\/a> policies evaluate sign-in requests using additional identity-driven signals like user or group membership, IP location information, and device status, among others, and are enforced for suspicious sign-ins. Organizations can protect themselves from attacks that leverage stolen credentials by enabling policies such as compliant devices or trusted IP address requirements.<strong><\/strong><\/li>\n<li><strong>Implement <\/strong><a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/conditional-access\/concept-continuous-access-evaluation?ocid=magicti_ta_learndoc\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>continuous access evaluation<\/strong><\/a><strong>.<\/strong><\/li>\n<li><strong>Invest in advanced anti-phishing solutions <\/strong>thatmonitor and scan incoming emails and visited websites. For example, organizations can leverage web browsers that automatically <a href=\"https:\/\/learn.microsoft.com\/deployedge\/microsoft-edge-security-smartscreen?ocid=magicti_ta_learndoc\" target=\"_blank\" rel=\"noreferrer noopener\">identify and block malicious websites<\/a>, including those used in this phishing campaign, and solutions that <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-office-365\">detect and block malicious emails, links, and files<\/a>.<\/li>\n<li><strong>Continuously monitor suspicious or anomalous activities. <\/strong>Hunt for sign-in attempts with suspicious characteristics (for example, location, ISP, user agent, and use of anonymizer services).&nbsp;<\/li>\n<\/ul>\n<h2>Detection details and hunting queries&nbsp;<\/h2>\n<h3>Microsoft 365 Defender&nbsp;<\/h3>\n<p>Because AiTM phishing attacks are complex threats, they require solutions that leverage signals from multiple sources. <a href=\"https:\/\/www.microsoft.com\/security\/business\/threat-protection\/microsoft-365-defender\">Microsoft 365 Defender<\/a> uses its cross-domain visibility to detect malicious activities related to AiTM, such as session cookie theft and attempts to use stolen cookies for signing in.<\/p>\n<p>Using Microsoft Defender for Cloud Apps <a href=\"https:\/\/learn.microsoft.com\/defender-cloud-apps\/enable-instant-visibility-protection-and-governance-actions-for-your-apps\">connectors<\/a>, Microsoft 365 Defender raises AiTM-related alerts in multiple scenarios.&nbsp;For Azure AD customers using Microsoft Edge, attempts by attackers to replay session cookies to access cloud applications are detected by Defender for Cloud Apps connectors for <a href=\"https:\/\/learn.microsoft.com\/defender-cloud-apps\/connect-office-365\">Office 365<\/a> and <a href=\"https:\/\/learn.microsoft.com\/defender-cloud-apps\/connect-azure\">Azure<\/a>. In such scenarios, Microsoft 365 Defender raises the following alert:<\/p>\n<ul>\n<li>Stolen session cookie was used<\/li>\n<\/ul>\n<p>In addition, signals from these Defender for Cloud Apps connectors, combined with data from the Defender for Endpoint network protection capabilities, also triggers the following Microsoft 365 Defender alert on Azure AD environments:<\/p>\n<ul>\n<li>Possible AiTM phishing attempt&nbsp;<\/li>\n<\/ul>\n<p>A specific Defender for Cloud Apps <a href=\"https:\/\/learn.microsoft.com\/defender-cloud-apps\/connect-okta\">connector for Okta<\/a>, together with Defender for Endpoint, also helps detect AiTM attacks on Okta accounts using the following alert:<\/p>\n<ul>\n<li>Possible AiTM phishing attempt in Okta<\/li>\n<\/ul>\n<p>In addition, Microsoft 365 Defender has the following related alerts for activity related to the DEV-0928 threat actor, as well as high-risk Azure AD sign-in activity:<\/p>\n<ul>\n<li>DEV-0928 activity group&nbsp;<\/li>\n<li>Suspicious network connection to AiTM phishing site&nbsp;<\/li>\n<li>Connection to Adversary-in-the-Middle (AiTM) phishing site<\/li>\n<\/ul>\n<h3>Microsoft Sentinel<\/h3>\n<p>Microsoft Sentinel customers can use the following Microsoft Sentinel Analytics template to identify potential AiTM phishing attempts:<\/p>\n<ul>\n<li><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/SecurityThreatEssentialSolution\/Analytic%20Rules\/PossibleAiTMPhishingAttemptAgainstAAD.yaml\">Possible AiTM Phishing Attempt Against Azure AD<\/a><\/li>\n<\/ul>\n<p>This detection uses signals from Azure AD Identity Protection, specifically it looks for successful sign ins that have been flagged as high risk, and then combines this with data from Web Proxy services such as ZScaler to identify where users might have connected to the source of those sign ins immediately prior. This can indicate a user interacting with a AiTM phishing site and having their session hijacked. This detection uses the Advanced Security Information Model (ASIM) Web Session schema. More details on the schema and its requirements can be found in the documentation: <a href=\"https:\/\/learn.microsoft.com\/azure\/sentinel\/normalization-schema-web\">https:\/\/learn.microsoft.com\/azure\/sentinel\/normalization-schema-web<\/a><\/p>\n<p>In addition, customers can use the following identity-focused Analytics and Hunting Queries to detect and investigate anomalous sign-in events that may be indicative of a compromised user identity being accessed by a threat actor:<\/p>\n<ul>\n<li><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/Azure%20Active%20Directory\/Analytic%20Rules\/AnomalousUserAppSigninLocationIncrease-detection.yaml\">Anomalous sign-in location by user account and authenticating application<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/Azure%20Active%20Directory\/Analytic%20Rules\/AzurePortalSigninfromanotherAzureTenant.yaml\">Azure Portal Signin from another Azure Tenant<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/Azure%20Active%20Directory\/Analytic%20Rules\/UserAccounts-CABlockedSigninSpikes.yaml\">User Accounts &#8211; Sign in Failure due to CA Spike<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/Cloud%20Identity%20Threat%20Protection%20Essentials\/Hunting%20Queries\/Signins-From-VPS-Providers.yaml\">Signins From VPS Providers<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/Cloud%20Identity%20Threat%20Protection%20Essentials\/Hunting%20Queries\/Signins-from-NordVPN-Providers.yaml\">Signins from Nord VPN Providers<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/SigninLogs\/SuccessfulSigninFromNon-CompliantDevice.yaml\">Successful Signin From Non-Compliant Device<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/SigninLogs\/UserLoginIPAddressTeleportation.yaml\">User Login IP Address Teleportation<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/SigninLogs\/anomalous_app_azuread_signin.yaml\">Anomalous Azure Active Directory apps based on authentication location<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/SigninLogs\/new_locations_azuread_signin.yaml\">Azure Active Directory signins from new locations<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/SigninLogs\/signinBurstFromMultipleLocations.yaml\">Azure Active Directory sign-in burst from multiple locations<\/a><\/li>\n<\/ul>\n<p>Microsoft Sentinel customers can also use the data provided by Microsoft Sentinel\u2019s UEBA engine to hunt for anomalous login events such as where the ISP being logged in from is not commonly seen in the tenant, or if the user agent is uncommon amongst the user\u2019s peer group. More details on Microsoft Sentinel UEBA feature can be found here: <a href=\"https:\/\/learn.microsoft.com\/azure\/sentinel\/ueba-reference\">https:\/\/learn.microsoft.com\/azure\/sentinel\/ueba-reference<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/13\/dev-1101-enables-high-volume-aitm-campaigns-with-open-source-phishing-kit\/\">DEV-1101 enables high-volume AiTM campaigns with open-source phishing kit<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/13\/dev-1101-enables-high-volume-aitm-campaigns-with-open-source-phishing-kit\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Microsoft Security Threat Intelligence| Date: Mon, 13 Mar 2023 16:00:00 +0000<\/strong><\/p>\n<p>DEV-1101 is an actor tracked by Microsoft responsible for the development, support, and advertising of several AiTM phishing kits, including an open-source kit capable of circumventing MFA through reverse-proxy functionality.  <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/13\/dev-1101-enables-high-volume-aitm-campaigns-with-open-source-phishing-kit\/\">DEV-1101 enables high-volume AiTM campaigns with open-source phishing kit<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[28838,4500,12270,10516,22453,3924,714],"class_list":["post-21461","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-adversary-in-the-middle","tag-cybersecurity","tag-man-in-the-middle","tag-microsoft","tag-microsoft-security-intelligence","tag-phishing","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21461"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21461\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}