Visualize Entra Password Spray Attack with ADX Interactive Map
By Steven Lim

Visualize Entra Password Spray Attack with ADX Interactive Map

On my 28th Dec 2023 Linkedin post, I shared about adversary commencing password spray on my Entra tenant on boxing day with one Azure Sentinel chart screenshot (top picture) and one Azure Data Explorer (ADX) screenshot (bottom picture).

Password Spray Visualization with Azure Sentinel and Azure Data Explorer

For those interested in visualizing password spray attack on the top picture chart, you can use the below KQL and view in "Chart" mode.

SigninLogs
| where TimeGenerated > ago(7d)
| where ResultType == "50053" or ResultType == "50126"
| summarize PasswordSpray_Per_HalfHour=count() by bin (TimeGenerated, 30m)        

For those interested in visualizing password spray attack locations from a world map (similar to my Dec post), you can follow below recent Microsoft blog instructions:

Visualize Entra Sign-in Logs using an Interactive Map (By Timur Engin - Published Jan 16 2024)

https://techcommunity.microsoft.com/t5/microsoft-entra-blog/visualize-entra-sign-in-logs-using-an-interactive-map/ba-p/4013853

Replace the above blog's KQL with the below KQL to visualize Password Spray Attack locations.

 SigninLogs
| where TimeGenerated > ago(7d)
| where ResultType == "50053" or ResultType == "50126"
| where isnotempty(LocationDetails.geoCoordinates)
| extend Latitude = toreal(LocationDetails.geoCoordinates["latitude"])
| extend Longitude = toreal(LocationDetails.geoCoordinates["longitude"])
| summarize Count = count() by Longitude, Latitude
| project Longitude, Latitude, Count
| render scatterchart with (kind=map)        

By building such attack interactive map, it will give your SecOps team a good visualization of your spray attack and possibly implementing geo-fencing conditional access block on certain attack network group to mitigate the attack risk if necessary.

#cybersecurity #cyberattack #passwordspray #cyberwar #cyberlandscape #sentinel #ADX



Mohammad Hasan Hashemi

Entrepreneurial Leader & Cybersecurity Strategist

1 å¹´

The Microsoft blog instructions you shared provide a step-by-step guide for creating an interactive map. This approach is instrumental in understanding the global scope of the attacks.

赞
回复
Bob L.

Balancing functionality and operations with security

1 å¹´

Greg Woter worth checking out…

要查看或添加评论,请登录

Steven Lim的更多文章

  • Copilot Agent: The Good, the Bad, and the Ugly

    Copilot Agent: The Good, the Bad, and the Ugly

    It's been a while since my last LinkedIn article in August, but after attending some of the online sessions from…

    9 条评论
  • Fortifying Defenses: Combatting Malicious Copilot Prompts and Studio Bot Vulnerabilities

    Fortifying Defenses: Combatting Malicious Copilot Prompts and Studio Bot Vulnerabilities

    On 8th August 2024 at Black Hat security conference in Las Vegas, Zenity's CTO Michael Bargury showcased how a…

    2 条评论
  • DefenderXDR Advanced Hunting All-In-One UPN Search

    DefenderXDR Advanced Hunting All-In-One UPN Search

    This KQL query searches across these DefenderXDR log tables for the UPN variable that is defined at the start:…

    4 条评论
  • DefenderXDR Advanced Hunting All-In-One IP Search

    DefenderXDR Advanced Hunting All-In-One IP Search

    This KQL query searches across these DefenderXDR log tables for the ip variable that is defined at the start:…

    4 条评论
  • Detecting Golden SAML Attack

    Detecting Golden SAML Attack

    On May 16, Microsoft Defender portal published the Threat Analytics Report - Technique Profile: Golden SAML. Golden…

    1 条评论
  • Microsoft Sentinel KQL Solo Leveling

    Microsoft Sentinel KQL Solo Leveling

    When it comes to threat hunting it's always the process of reorganizing or summarizing data in a table to analyze it…

    16 条评论
  • Azure Cloud Security Monitoring

    Azure Cloud Security Monitoring

    Change History: Initial article - Detect new blob with allowBlobPublicAccess enabled Detect new public IP address…

    4 条评论
  • The Hunt for QR Phisher

    The Hunt for QR Phisher

    Change History Initial article published Added Visualize QR-Phishing Attack with ADX Interactive Map Added Hunting for…

    9 条评论
  • The KQL Grimoire

    The KQL Grimoire

    A collection of the most sought-after KQL spells for Microsoft Sentinel and DefenderXDR ?? [** Updated: 27 February…

    16 条评论
  • Using MDCA user and entity behavioral analytics (UEBA) and machine learning (ML) to monitor Copilot for Microsoft 365 activities ??

    Using MDCA user and entity behavioral analytics (UEBA) and machine learning (ML) to monitor Copilot for Microsoft 365 activities ??

    In this article I will share with you on how you can configure a MDCA Cloud Discovery for Copilot for Microsoft 365…

社区洞察

其他会员也浏览了