Application Removed from Blocklist in Google Workspace
Google Workspace administrators may be aware of malicious applications within the Google marketplace and block these applications for user security purposes. An adversary, with administrative privileges, may remove this application from the explicit block list to allow distribution of the application amongst users. This may also indicate the unauthorized use of an application that had been previously blocked before by a user with admin privileges.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2022/08/25"
3integration = ["google_workspace"]
4maturity = "production"
5updated_date = "2024/09/23"
6
7[rule]
8author = ["Elastic"]
9description = """
10Google Workspace administrators may be aware of malicious applications within the Google marketplace and block these
11applications for user security purposes. An adversary, with administrative privileges, may remove this application from
12the explicit block list to allow distribution of the application amongst users. This may also indicate the unauthorized
13use of an application that had been previously blocked before by a user with admin privileges.
14"""
15false_positives = [
16 """
17 Applications can be added and removed from blocklists by Google Workspace administrators. Verify that the
18 configuration change was expected. Exceptions can be added to this rule to filter expected behavior.
19 """,
20]
21from = "now-130m"
22index = ["filebeat-*", "logs-google_workspace*"]
23interval = "10m"
24language = "kuery"
25license = "Elastic License v2"
26name = "Application Removed from Blocklist in Google Workspace"
27note = """## Triage and analysis
28
29### Investigating Application Removed from Blocklist in Google Workspace
30
31Google Workspace Marketplace is an online store for free and paid web applications that work with Google Workspace services and third-party software. Listed applications are based on Google APIs or Google Apps Script and created by both Google and third-party developers.
32
33Marketplace applications require access to specific Google Workspace resources. Individual users with the appropriate permissions can install applications in their Google Workspace domain. Administrators have additional permissions that allow them to install applications for an entire Google Workspace domain. Consent screens typically display permissions and privileges the user needs to install an application. As a result, malicious Marketplace applications may require more permissions than necessary or have malicious intent.
34
35Google clearly states that they are not responsible for any Marketplace product that originates from a source that isn't Google.
36
37This rule identifies a Marketplace blocklist update that consists of a Google Workspace account with administrative privileges manually removing a previously blocked application.
38
39#### Possible investigation steps
40
41- Identify the associated user accounts by reviewing `user.name` or `user.email` fields in the alert.
42- This rule relies on data from `google_workspace.admin`, thus indicating the associated user has administrative privileges to the Marketplace.
43- With access to the Google Workspace admin console, visit the `Security > Investigation` tool with filters for the user email and event is `Assign Role` or `Update Role` to determine if new cloud roles were recently updated.
44- After identifying the involved user account, review other potentially related events within the last 48 hours.
45- Re-assess the permissions and reviews of the Marketplace applications to determine if they violate organizational policies or introduce unexpected risks.
46- With access to the Google Workspace admin console, determine if the application was installed domain-wide or individually by visiting `Apps > Google Workspace Marketplace Apps`.
47
48### False positive analysis
49
50- Google Workspace administrators might intentionally remove an application from the blocklist due to a re-assessment or a domain-wide required need for the application.
51- Identify the user account associated with this action and assess their administrative privileges with Google Workspace Marketplace.
52- Contact the user to verify that they intentionally removed the application from the blocklist and their reasoning.
53
54### Response and remediation
55
56- Initiate the incident response process based on the outcome of the triage.
57- Disable or limit the account during the investigation and response.
58- Identify the possible impact of the incident and prioritize accordingly; the following actions can help you gain context:
59 - Identify the account role in the cloud environment.
60 - Assess the criticality of affected services and servers.
61 - Work with your IT team to identify and minimize the impact on users.
62 - Identify if the attacker is moving laterally and compromising other accounts, servers, or services.
63 - Identify any regulatory or legal ramifications related to this activity.
64- Investigate credential exposure on systems compromised or used by the attacker to ensure all compromised accounts are identified. Reset passwords or delete API keys as needed to revoke the attacker's access to the environment. Work with your IT teams to minimize the impact on business operations during these actions.
65- Review the permissions assigned to the implicated user to ensure that the least privilege principle is being followed.
66- Implement security best practices [outlined](https://support.google.com/a/answer/7587183) by Google.
67- Determine the initial vector abused by the attacker and take action to prevent reinfection via the same vector.
68- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
69
70## Setup
71
72The Google Workspace Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
73
74### Important Information Regarding Google Workspace Event Lag Times
75- As per Google's documentation, Google Workspace administrators may observe lag times ranging from minutes up to 3 days between the time of an event's occurrence and the event being visible in the Google Workspace admin/audit logs.
76- This rule is configured to run every 10 minutes with a lookback time of 130 minutes.
77- To reduce the risk of false negatives, consider reducing the interval that the Google Workspace (formerly G Suite) Filebeat module polls Google's reporting API for new events.
78- By default, `var.interval` is set to 2 hours (2h). Consider changing this interval to a lower value, such as 10 minutes (10m).
79- See the following references for further information:
80 - https://support.google.com/a/answer/7061566
81 - https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-module-google_workspace.html"""
82references = [
83 "https://support.google.com/a/answer/6328701?hl=en#",
84 "https://www.elastic.co/security-labs/google-workspace-attack-surface-part-one",
85 "https://www.elastic.co/security-labs/google-workspace-attack-surface-part-two"
86]
87risk_score = 47
88rule_id = "495e5f2e-2480-11ed-bea8-f661ea17fbce"
89severity = "medium"
90tags = [
91 "Domain: Cloud",
92 "Data Source: Google Workspace",
93 "Use Case: Configuration Audit",
94 "Resources: Investigation Guide",
95 "Tactic: Defense Evasion",
96]
97timestamp_override = "event.ingested"
98type = "query"
99
100query = '''
101event.dataset:"google_workspace.admin" and event.category:"iam" and event.type:"change" and
102 event.action:"CHANGE_APPLICATION_SETTING" and
103 google_workspace.admin.application.name:"Google Workspace Marketplace" and
104 google_workspace.admin.old_value: *allowed*false* and google_workspace.admin.new_value: *allowed*true*
105'''
106
107
108[[rule.threat]]
109framework = "MITRE ATT&CK"
110[[rule.threat.technique]]
111id = "T1562"
112name = "Impair Defenses"
113reference = "https://attack.mitre.org/techniques/T1562/"
114[[rule.threat.technique.subtechnique]]
115id = "T1562.001"
116name = "Disable or Modify Tools"
117reference = "https://attack.mitre.org/techniques/T1562/001/"
118
119
120
121[rule.threat.tactic]
122id = "TA0005"
123name = "Defense Evasion"
124reference = "https://attack.mitre.org/tactics/TA0005/"
Triage and analysis
Investigating Application Removed from Blocklist in Google Workspace
Google Workspace Marketplace is an online store for free and paid web applications that work with Google Workspace services and third-party software. Listed applications are based on Google APIs or Google Apps Script and created by both Google and third-party developers.
Marketplace applications require access to specific Google Workspace resources. Individual users with the appropriate permissions can install applications in their Google Workspace domain. Administrators have additional permissions that allow them to install applications for an entire Google Workspace domain. Consent screens typically display permissions and privileges the user needs to install an application. As a result, malicious Marketplace applications may require more permissions than necessary or have malicious intent.
Google clearly states that they are not responsible for any Marketplace product that originates from a source that isn't Google.
This rule identifies a Marketplace blocklist update that consists of a Google Workspace account with administrative privileges manually removing a previously blocked application.
Possible investigation steps
- Identify the associated user accounts by reviewing
user.name
oruser.email
fields in the alert. - This rule relies on data from
google_workspace.admin
, thus indicating the associated user has administrative privileges to the Marketplace. - With access to the Google Workspace admin console, visit the
Security > Investigation
tool with filters for the user email and event isAssign Role
orUpdate Role
to determine if new cloud roles were recently updated. - After identifying the involved user account, review other potentially related events within the last 48 hours.
- Re-assess the permissions and reviews of the Marketplace applications to determine if they violate organizational policies or introduce unexpected risks.
- With access to the Google Workspace admin console, determine if the application was installed domain-wide or individually by visiting
Apps > Google Workspace Marketplace Apps
.
False positive analysis
- Google Workspace administrators might intentionally remove an application from the blocklist due to a re-assessment or a domain-wide required need for the application.
- Identify the user account associated with this action and assess their administrative privileges with Google Workspace Marketplace.
- Contact the user to verify that they intentionally removed the application from the blocklist and their reasoning.
Response and remediation
- Initiate the incident response process based on the outcome of the triage.
- Disable or limit the account during the investigation and response.
- Identify the possible impact of the incident and prioritize accordingly; the following actions can help you gain context:
- Identify the account role in the cloud environment.
- Assess the criticality of affected services and servers.
- Work with your IT team to identify and minimize the impact on users.
- Identify if the attacker is moving laterally and compromising other accounts, servers, or services.
- Identify any regulatory or legal ramifications related to this activity.
- Investigate credential exposure on systems compromised or used by the attacker to ensure all compromised accounts are identified. Reset passwords or delete API keys as needed to revoke the attacker's access to the environment. Work with your IT teams to minimize the impact on business operations during these actions.
- Review the permissions assigned to the implicated user to ensure that the least privilege principle is being followed.
- Implement security best practices outlined by Google.
- Determine the initial vector abused by the attacker and take action to prevent reinfection via the same vector.
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
Setup
The Google Workspace Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
Important Information Regarding Google Workspace Event Lag Times
- As per Google's documentation, Google Workspace administrators may observe lag times ranging from minutes up to 3 days between the time of an event's occurrence and the event being visible in the Google Workspace admin/audit logs.
- This rule is configured to run every 10 minutes with a lookback time of 130 minutes.
- To reduce the risk of false negatives, consider reducing the interval that the Google Workspace (formerly G Suite) Filebeat module polls Google's reporting API for new events.
- By default,
var.interval
is set to 2 hours (2h). Consider changing this interval to a lower value, such as 10 minutes (10m). - See the following references for further information:
References
Related rules
- Domain Added to Google Workspace Trusted Domains
- Google Workspace Bitlocker Setting Disabled
- Google Workspace Restrictions for Marketplace Modified to Allow Any App
- Application Added to Google Workspace Domain
- Google Workspace 2SV Policy Disabled