Azure AD Account Credential Leaked
Indicates that the user's valid credentials have been leaked.
Sigma rule (View on GitHub)
1title: Azure AD Account Credential Leaked
2id: 19128e5e-4743-48dc-bd97-52e5775af817
3status: test
4description: Indicates that the user's valid credentials have been leaked.
5references:
6 - https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#leaked-credentials
7 - https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
8author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
9date: 2023-09-03
10tags:
11 - attack.t1589
12 - attack.reconnaissance
13logsource:
14 product: azure
15 service: riskdetection
16detection:
17 selection:
18 riskEventType: 'leakedCredentials'
19 condition: selection
20falsepositives:
21 - A rare hash collision.
22level: high
References
Related rules
- SSHD Error Message CVE-2018-15473
- AADInternals PowerShell Cmdlets Execution - ProccessCreation
- AADInternals PowerShell Cmdlets Execution - PsScript
- Bitbucket User Details Export Attempt Detected
- Bitbucket User Permissions Export Attempt