Lateral Movement Exploitation in New Microsoft Azure AD CTS Feature
Written by Jacob Dancey
Introduction
Microsoft announced Cross-Tenant Synchronisation (CTS) in June, which allows administrators to effortlessly synchronise users and groups across various tenants and their related resources. This innovation improves collaboration by automating lifecycle management for business-to-business projects, among other things.
The CTS configuration entails connecting an Azure 'source' tenant to a 'target' tenant, with users from the source automatically synchronised to the target. Data is exclusively pushed from the source to the target during this unilateral synchronisation.
However, if not properly configured, bad actors who have already infiltrated a tenant and gained elevated rights could take advantage of this new feature. They could exploit it to travel laterally to other interconnected tenants and build persistent unauthorised CTS settings, potentially leading to additional compromise.
Invictus previously highlighted this potential attack vector in a paper that largely focuses on detecting and fighting threats that leverage this functionality.
Vulnerabilities in CTS Configuration
Vectra, a cybersecurity firm, elaborates in their article on how threat actors could exploit this functionality to transmit laterally to related tenants or build persistence within the system.
Nonetheless, Vectra emphasises that exploiting this capability requires the initial penetration of a privileged account or the acquisition of privilege escalation within a hacked Microsoft cloud infrastructure.
"While we have not yet observed this technique being used in real-world incidents, given the historical misuse of similar functionalities, we provide comprehensive insights to help defenders understand potential attack scenarios and implement monitoring mechanisms,".
Vectra's report describes two main techniques:
领英推荐
Defending Against These Attacks
While no reported attacks utilising this functionality have been discovered, Vectra advises techniques to strengthen your configuration and reduce the possibility of exploitation. Businesses must maintain their commitment to implementing and enforcing security best practises in order to reduce the risk of account compromise. The following guidelines are critical for CTS target and source tenants to strengthen their security posture:
CTS Target Tenants
CTS Source Tenants
By adhering to these comprehensive recommendations, businesses can significantly enhance their security posture and minimize the vulnerabilities associated with the Cross-Tenant Synchronization (CTS) feature. This proactive approach to security underscores the commitment to safeguarding critical resources and data from compromise and unauthorized access.
CSA will continue to monitor the situation and will work with all affected clients to create rules to further protect all assets that could be affected by a CTS attack.