FireEye has released a report and PowerShell tool for auditing networks for evidence of attacker techniques that have been observed through investigations after Solarwinds hacks. While the report is over 35 pages long, a summary of the attackers’ techniques can be found below:
- Steal ADFS (Active Directory Federation Services) token-signing certificate and use it to forge tokens for arbitrary users.
- Modify or add trusted domains in Azure to add a new Identity Provider that the attacker controls, allowing for the forging of arbitrary users.
- Compromise important accounts like Global Administrator or Application Administrator.
- Hijack an existing Microsoft 365 application by adding a rogue credential to it to read email, send an email, access user calendars, and steal other data, all while bypassing MFA.