When Simple Configurations Go Rogue: The Cloud Security Threat You Didn't See Coming
...And 12 Cybersecurity Posts from around LinkedIn
In this Issue
Foreword | 12 Posts on Cyber |?Featured Leader | From Cyngular's Founder | Afterword
Foreword
We're excited to share 12 more posts about cybersecurity from across LinkedIn along with information on our upcoming cyber event! Useful content this week includes 6 key points from a cybersecurity guide, top 5 emerging AI threats, and a playbook to counter the latest ransomware gangs and attacks.
We highlight a Featured Leader again this week.
Finally, a piece from researchers at Cyngular Security which discusses in detail how seemingly benign configurations can sometimes open the door to significant security threats.
We're happy to send out our twenty-fifth issue, written to deliver content of value that is easily digestible.
We welcome all feedback, submissions, and input from our readers. If you have questions, submissions, or concerns, contact Rebecca Fera .
12 Posts on Cyber
Useful LinkedIn Posts This Week in Cybersecurity
Vishal Salvi explored vulnerabilities, recent breaches, and best practices in cybersecurity
Best practices for event logging and threat detection were detailed by George Varghese
Ali Ali underlined types of cybersecurity specialties and their importance in defending against threats
A security operations center A-Z guide, overviewed by Mohammed Sasni
Weekly cybersecurity update on intercepting HTTPS traffic with Burp Suite and FoxyProxy, discussed by Aditi Patil
Our Webinar Event is Live!
Join us online on Tuesday, September 10th from 11:00 a.m. - 12:00 p.m. EST for this transformative event designed for CISOs, SOC professionals and cybersecurity experts who want to have a robust IR strategy for the cloud - and avoid getting caught off guard at the worst possible time.
Here's what you can expect:
This event is not your typical webinar. It features cloud cybersecurity experts with unique solutions, tailored to the specific needs of today’s SOC teams.
Register here!
Featured Leader
Matthew Hyland
Currently a Cybersecurity Fellow at 富国银行 , Matthew Hyland has 22 years of experience in the US Air Force as a Cyber Warfare Operator, with various leadership roles in information technology and information security. Matthew's core competencies include cyber warfare, interagency coordination, threat and vulnerability management, and strategy. In his circle, Matthew is known to be an expert in strategic and tactical planning, compliance, governance, and setting the posture of information security organizations.
Along with field experience, Matthew also holds multiple certifications such as CISSP and C|CISO, and he has completed executive education courses from the Wharton School at University of Pennsylvania, MIT Sloan, and the National Defense University. Matthew's mission is to leverage his expertise in cybersecurity and information technology to enhance the readiness, agility, and innovation of the organizations he serves.
Matthew is another featured leader we are happy to share with you this week.
领英推荐
From Cyngular's Research Team
In the world of cloud computing, seemingly benign configurations can sometimes open the door to significant security threats. One such configuration is the FunctionApp in Azure, which, under certain circumstances, can be exploited by attackers to escalate privileges through its associated storage account. At first glance, this setup appears to be a straightforward mechanism used for application hosting. However, attackers can leverage its configuration to gain unauthorized access to sensitive data in cloud environments. From an Incident Response (IR) perspective, it’s crucial to understand how these simple configurations can be turned against us and what can be done to mitigate the threat.
Understanding the Threat
Azure FunctionApp is a server-less compute service that enables you to run code without provisioning or managing infrastructure. It is commonly used for executing code in response to events. However, its associated storage account, which is used for managing triggers and storing logs, can become a vector for privilege escalation if not properly secured.
For example, an attacker with access to the FunctionApp’s storage account can potentially gain higher privileges by exploiting shared key authorization or misconfigurations. This could allow unauthorized access to sensitive data or enable the attacker to manipulate the FunctionApp’s behavior, leading to broader compromise within the cloud environment.
The Attacker's Perspective
From an attacker's viewpoint, the FunctionApp’s storage account is a valuable target for evasion and persistence. By gaining access to this storage account, they can manipulate function triggers, access logs, and even modify the function code. This can help them to establish persistence, exfiltrate data, or disrupt operations while avoiding detection by blending in with legitimate activities.
To illustrate this, consider a scenario where an attacker uses shared key authorization to access the storage account. Once inside, they can modify function bindings or inject malicious code, effectively escalating their privileges and extending their control over the cloud environment.
Storage Account Access Keys
Storage account access keys in Azure are essential for authenticating and authorizing access to storage account resources. These keys grant full permissions to access and manage data in the storage account, including blobs, queues, tables, and files. Each storage account has two keys to facilitate seamless key rotation without downtime. Due to their powerful capabilities, it is crucial to protect these keys and limit their use to secure applications only, minimizing the risk of unauthorized access.
Deep Dive
As previously mentioned, for an attacker to compromise a Function App, they first need access to the associated storage account in order to list its access keys. Let’s assume an attacker has managed to obtain a Service Principal credential that was accidentally exposed in a public repository. With this credential, the attacker can start by searching for storage accounts associated with the Function App. Azure stores critical files for the Function App in a file share that it generates. Specifically, these files are housed in directories such as site/wwwroot. Additionally, Azure stores certain files in two containers: azure-webjobs-hosts and azure-webjobs-secrets. Both of these storage methods can be used to identify the relevant storage accounts.
Once the attacker has access, they can list all files within the Function App, including:
Additionally, each function within the Function App has its own JSON file containing specific keys for that function.
The attacker could then download the host.json file and modify its masterKey section - changing the key to a new value and disabling the encryption.
After making these modifications, the attacker can upload the altered host.json file back to the storage account. Azure will take a few minutes to synchronize the changes, after which it will accept the new, unencrypted key.
At this point, the attacker can modify the Function App’s code to execute malicious actions. For example, they might download the function_app.py file and alter its source code to return the Function App’s managed identity access token (assuming the Function App has a managed identity attached). The function App’s managed identity access token! (Requires a managed identity attached to the function).
By taking these steps, the attacker could potentially gain unauthorized access to sensitive resources within the Azure environment, demonstrating the critical importance of securely managing access keys and monitoring for any unauthorized changes.
Only Storage accounts actions were performed!
Mitigation Strategies
To defend against the potential abuse of the storage account associated with Azure Function App, Cyngular Security recommends implementing the following mitigation strategies:
By applying these strategies and leveraging Cyngular Security's CIRA platform, organizations can effectively protect their Azure FunctionApps and associated storage accounts from unauthorized access and potential exploitation.
The essence of cloud security lies in proactive measures, and Cyngular Security's Cloud Investigation and Response Automation (CIRA) platform incorporates this principle - automated, efficient cloud environment investigations. By integrating Cyngular Security's CIRA, you equip your team with the capability to quickly address and mitigate threats, ensuring robust protection for your cloud assets. Embrace Cyngular Security's CIRA for a deep, effective security strategy that keeps you ahead of threats.
Read the full article with graphic support here
Afterword
That's all for this week's newsletter. Our next issue will include another piece from Cyngular's Founder, a Featured Leader, and a new batch of 12 useful posts. Connect with us if you have anything to submit for our next issue or want to know more about Cyngular.
Notice:
The posts in this issue reflect the views only of the individual LinkedIn users and do not reflect the views of Cyngular Security, its employees, or any other entities. The links shared in this issue were written by LinkedIn users and do not constitute an endorsement of Cyngular Security, any other entities, or this newsletter by those users, entities, or the "Featured Leader."
Reach out to Rebecca Fera if you have any concerns about CISO Signal.
Executive - IT Risk/Information Security| Cybersecurity| Business Resilience| Operational Risk| Enterprise Risk| Third Party Risk| Speaker| Mentor| C-Suite Advisor
6 个月Congratulations Matthew! Thanks for sharing the good news. Wish you many more accolades.
Co-Founder & CEO Cyngular Security | Entrepreneur | Former Deputy Director-General of the Israeli National Cyber Directorate (INCD) | Former CISO CSO
6 个月#Cyngular Rocks!!! Launching the #THIRDhub platform a few weeks ago as a groundbreaking disruptive solution redefines the way #SOC for cloud environments will operate from now on and how security measures like EDRs, Posture management, SIEM, and SOAR will be empowered by Cyngular’s technology. Contact me to learn more Dont be regular be #Cyngular
Founder @ PSB Modern | Crafting Strategies that Connect, Captivate, and Convert | psbmodern.com
6 个月Awesome insights, can't wait for the webinar!