PSA and RMM

Solve any challenge with one platform

Operate more efficiently, reduce complexity, improve EBITDA, and much more with the purpose-built platform for MSPs.

Cybersecurity and Data Protection

Ensure security and business continuity, 24/7

Protect and defend what matters most to your clients and stakeholders with ConnectWise's best-in-class cybersecurity and BCDR solutions.

Automation and Integrations

Integrate and automate to unlock cost savings

Leverage generative AI and RPA workflows to simplify and streamline the most time-consuming parts of IT.

University

University Log-In

Check out our online learning platform, designed to help IT service providers get the most out of ConnectWise products and services.

About Us

Experience the ConnectWise Way

Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.

News and Press

Experience the ConnectWise Way

Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.

ConnectWise

8/20/2025 | 18 Minute Read

Monthly Threat Brief: July 2025

Topics:

Contents

    Ready to dive even deeper?

    Check out the 2025 MSP Threat Report for an in-depth analysis of overall trends.

    Welcome to the July 2025 edition of the ConnectWise Cyber Research Unit™ (CRU) Monthly Threat Brief. This report provides a comprehensive look at the most significant cybersecurity developments impacting the MSP and SMB landscape. We break down the month’s top stories, critical vulnerabilities, and prevalent malware families to help you stay informed and prepared in an evolving threat environment. Starting this month, we have also begun adding descriptions of all the new detection signatures added to the ConnectWise SIEM™.

    Top story for July 2025

    Critical supply chain vulnerability exposes AI development tool ecosystem risks

    Security researcher Oren Yomtov discovered VSXPloit, a critical vulnerability in OpenVSX, which is the open-source extension marketplace for AI development tools such as Cursor, Windsurf, and VSCodium. The flaw exploited automated nightly builds to capture the @open-vsx account’s secret token, enabling attackers to publish malicious updates, overwrite existing extensions, and hijack the entire marketplace with super-admin privileges. Malicious code could be hidden in dependencies and executed during builds, with updates delivered silently through automatic extension updates without user alerts.

    This vulnerability represents part of a broader threat landscape targeting AI-powered development environments, particularly through Model Context Protocol (MCP) attacks. Key risks include tool poisoning (malicious instructions embedded in trusted tool descriptions), prompt injection bypassing filters, rogue server impersonation, and supply chain compromise where legitimate MCP servers are later modified maliciously. These attacks exploit the inherent trust AI models place in tool metadata and the rapid adoption of AI development tools that outpace security guardrails.

    What this means for MSPs

    For MSPs, this represents a significant expansion of supply chain risk requiring immediate attention to client development environments. The convergence of AI capabilities with development tools creates unprecedented attack vectors where every extension becomes a potential backdoor without proper vetting and monitoring.

    MSPs must evolve their security practices to include AI development tool governance, implement zero trust approaches for extensions, establish approval processes for development tools, and develop incident response procedures specific to compromised development environments. The rapid adoption of these productivity-enhancing tools demands proactive management, continuous monitoring, and potentially additional network segmentation for development workstations to limit blast radius.

    Critical SharePoint RCE exploit hitting MSP environments at scale

    Mass exploitation of the SharePoint vulnerability CVE-2025-53770 has compromised over 75 organizations globally, including US federal agencies, state governments, energy companies, and universities. The “ToolShell” campaign delivers unauthenticated remote code execution against on-premise SharePoint servers. The attack originated from legitimate security research presented at Pwn2Own Berlin in May 2025, which was quickly weaponized after researchers posted proof-of-concept details on social media in mid-July.

    The technical attack exploits SharePoint’s deserialization processes by manipulating HTTP headers to bypass authentication at the ToolPane endpoint, then extracting the server’s ValidationKey and DecryptionKey. With these cryptographic keys, attackers forge valid authentication tokens for persistent access. The vulnerability affects 8,000+ SharePoint servers worldwide, with coordinated attack waves hitting specific geographic regions. Even after patching, compromised servers remain vulnerable until machine keys are manually rotated, creating dangerous persistence windows.

    What this means for MSPs

    This represents the largest SharePoint compromise in recent memory, with critical infrastructure and government victims highlighting the severity. For MSPs, the challenge extends beyond typical patching. Many clients have forgotten on-premise SharePoint deployments that remain internet-accessible and unpatched. The unauthenticated nature bypasses all traditional security controls, such as MFA and network segmentation, while stolen machine keys enable legitimate-looking authentication for months or years post-compromise.

    This creates significant liability exposure and requires coordinated emergency response, including both patching and service-impacting key rotation procedures.

    ConnectWise deploys enhanced SharePoint detections as Chinese APTs drive ToolShell campaign

    Chinese state-sponsored groups, such as Linen Typhoon, Violet Typhoon, and Storm-2603, have been confirmed as the primary actors behind the widespread SharePoint exploitation campaign targeting CVE-2025-53770, with attacks beginning July 7, eleven days before public disclosure. These APT groups focus on long-term intelligence collection rather than immediate monetization, with Linen Typhoon specializing in IP theft from government/defense sectors, Violet Typhoon targeting former government personnel and think tanks, and Storm-2603 conducting machine key theft operations.

    CISA expanded its Known Exploited Vulnerabilities catalog to include the original ToolShell vulnerabilities (CVE-2025-49706 and CVE-2025-49704) alongside the bypass variants, mandating federal agency remediation by an emergency deadline.

    Public proof-of-concept exploits are now available on GitHub, dramatically lowering the technical barrier for exploitation and enabling less sophisticated actors to leverage advanced techniques developed by APT groups. Cloudflare recorded approximately 300,000 exploitation attempts during a single peak period on July 22, indicating widespread automated scanning despite patch availability. Enhanced detection capabilities have been deployed by the ConnectWise CRU for SIEM and SentinelOne customers, targeting specific indicators including spinstall0.aspx file creation, suspicious w3wp.exe processes, and correlated IIS log patterns showing successful exploitation followed by web shell access.

    What this means for MSPs

    The state-sponsored attribution fundamentally changes risk calculations for MSPs managing client SharePoint environments, as these actors establish persistent access for months or years before activation rather than seeking immediate monetization. MSPs must assume any internet-accessible SharePoint server was targeted and implement comprehensive remediation, including machine key rotation before and after patching, complete IIS service restarts, and treating automated detections as high-priority incidents. Client communication should emphasize the strategic nature of these attacks, as federal agencies and critical infrastructure are confirmed victims, providing crucial context for security investment decisions and incident response prioritization rather than framing this as routine cybercriminal activity.

    Top vulnerability in July 2025

    CVE-2025-53770

    CVE-2025-53770 is a critical zero-day vulnerability (CVSS 9.8) affecting on-premises Microsoft SharePoint servers through the deserialization of untrusted data, enabling unauthenticated remote code execution. First exploited in the wild around July 7-18, 2025, this vulnerability is part of the “ToolShell” exploit chain that bypasses authentication via the /layouts/15/ToolPane.aspx endpoint and allows attackers to extract cryptographic machine keys (ValidationKey/DecryptionKey) for persistent access even after patching.

    Microsoft confirmed the zero-day on July 19, 2025, and CISA added it to the KEV catalog on July 20. CVE-2025-53770 is a patch bypass for the previously patched CVE-2025-49704 from Pwn2Own Berlin 2025, indicating the original July patches were incomplete. Active exploitation has targeted government, telecommunications, finance, healthcare, education, and energy sectors with over 4,600 compromise attempts observed across 300+ organizations worldwide. Emergency patches are available for SharePoint 2016, 2019, and Subscription Edition, with organizations urged to immediately apply updates and rotate machine keys. Additional details are covered in the articles summarized earlier in this report.

    Top malware in July 2025

    The Diamond Model

    This section leverages the Diamond Model of Intrusion Analysis to structure the examination of recent malware activity, providing a clear analytical framework that links adversary, capabilities, infrastructure, and victimology. By applying the Diamond Model, we can better contextualize malicious behavior, identify patterns across campaigns, and highlight the relationships between threat actors, tools, and targeted entities.

    NetSupport RAT

    NetSupport RAT is a weaponized version of the legitimate NetSupport Manager remote administration tool (RAT) that has been commercially available since 1989. Originally developed as a genuine application for remote technical support and computer assistance, cybercriminals have hijacked this useful application and misappropriated it to use in their harmful campaigns. The tool provides comprehensive remote access capabilities, including real-time screen monitoring, keyboard and mouse control, file transfers, chat functionality, and desktop management, making it attractive to threat actors who can leverage its legitimate appearance and robust functionality without developing custom malware.

    The CRU has been continuously observing NetSupport RAT deployment by SmartApeSG, a threat group that employs drive-by compromise attacks through injected scripts on compromised websites. SmartApeSG has evolved their delivery methods from initial fake browser update lures similar to SocGholish to more recent ClickFix social engineering techniques. The RAT is typically distributed through deceptive websites, fake browser updates, and various phishing campaigns, with SmartApeSG using a combination of compromised domains and .top TLD domains for payload delivery. Their attack progression shows increasing sophistication, transitioning from batch file downloads with curl to more fileless techniques using PowerShell’s Expand-Archive cmdlet, ultimately leading to Stealc malware infections while maintaining persistence through registry Run keys.

    Infrastructure

    Recent IOCs

    Related File(s)
    SHA256 Filename(s)

    2c1946d794fb7a3ef08df70eedf65f2024c0c6d95ddea924bf057ba038254006

    client32.ini

    9921d6fd90d80611ea7c451ef61fc91790dc51d11cb2da37c76ceb604b6de179

    client32.ini

    24a9eab861109280e0fcd5e6bddf4ef69e8de19aa95c2e89d9de9d83aca2d4d5

    client32.ini

    54cd55bccc73929c60ae30374d085143b5700783da8e6c83bcf0e2a17e14a7f4

    client32.ini
    Domain Name(s)
    videoproduction.demostagingserver[.]com
    ifaengineers[.]com
    sizzlingcareer[.]com

    Victimology

    • Recently targeted business sectors: Hospitality, energy, consulting, non-profit, retail, healthcare

    Capabilities

    MITRE ATT&CK Techniques

    Tactic Technique ID   Technique Name
    Execution   T1204.002   User Execution: Malicious File
    Execution   T1059.001   Command and Scripting Interpreter: PowerShell
    Privilege Escalation   T1055   Process Injection
    Defense Evasion   T1027   Obfuscated File or Information
    Exfiltration   T1041   Exfiltration Over C2 Channel
    Collection   T1074.001   Data Staged: Local Data Staging
    Persistence   T1547.001   Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
    Discovery   T1057   Process Discovery
    Command and Control   T1219   Remote Access Software
    Execution   T1053.005   Scheduled Task/Job: Scheduled Task

    Akira

    Akira ransomware is a sophisticated double-extortion ransomware-as-a-service (RaaS) operation that emerged in March 2023, operated by experienced threat actors with ties to the dissolved Conti group. The ransomware targets both Windows and Linux systems, including VMware ESXi virtual machines, and employs two main variants: the original C++ implementation that appends .akira extensions to encrypted files, and the Rust-based “Megazord” variant introduced in August 2023 that uses .powerranges extensions.

    Akira gains initial access primarily through exploiting VPN vulnerabilities (particularly unpatched Cisco devices via CVE-2023-20269 and CVE-2020-3259), credential abuse, and spear phishing, then uses legitimate tools such as FileZilla, WinSCP, and RClone for data exfiltration before deploying encryption payloads.

    Akira has demonstrated explosive growth with a 348% increase in activity in Q2 2025 compared to the same period in 2024, maintaining consistent operations by listing approximately 130 organizations on its data-leak site each quarter. Since its inception, the group has impacted over 250 organizations across North America, Europe, and Australia, claiming approximately $42 million in ransomware proceeds through January 2024. The group now ranks as the second most prominent ransomware threat globally after Qilin, with intelligence indicating sustained high-volume operations continuing into Q3 2025.

    While researchers released a decryptor in May 2025 for certain variants used between September 2023 and May 2025, updated variants remain uncrackable, and the group’s consistent quarterly targeting of critical infrastructure and healthcare sectors demonstrates no signs of operational decline.

    Aliases

    • Akira, Megazord, Redbike

    Infrastructure    

    Recent IOCs

    Related File(s)
    SHA256 Filename(s)

    dcfa2800754e5722acf94987bb03e814edcb9acebda37df6da1987bf48e5b05e

    Win.exe

    d2fd0654710c27dcf37b6c1437880020824e161dd0bf28e3a133ed777242a0ca

    w.exe

    0ee1d284ed663073872012c7bde7fac5ca1121403f1a5d2d5411317df282796c

    akira_v2

    Victimology

    • Recently targeted business sectors: Construction, manufacturing

    Capabilities  

    MITRE ATT&CK Techniques

    Tactic Technique ID Technique Name
    Initial Access   T1078   Valid Accounts
    Initial Access   T1190   Exploit Public-Facing Application
    Initial Access   T1133   External Remote Services
    Initial Access   T1566.001   Phishing: Spearphishing Attachment
    Initial Access   T1566.002   Phishing: Spearphishing Link
    Credential Access   T1003   OS Credential Dumping
    Credential Access   T1003.001   OS Credential Dumping: LSASS Memory
    Discovery   T1016   System Network Configuration Discovery
    Discovery   T1082   System Information Discovery
    Discovery   T1482   Domain Trust Discovery
    Discovery   T1057   Process Discovery
    Discovery   T1069.001   Permission Groups Discovery: Local Groups
    Discovery   T1069.002   Permission Groups Discovery: Domain Groups
    Discovery   T1018   Remote System Discovery
    Persistence   T1136.002   Create Account: Domain Account
    Defense Evasion   T1562.001   Impair Defenses: Disable or Modify Tools
    Command and Control   T1219   Remote Access Software
    Command and Control   T1090   Proxy
    Collection   T1560.001   Archive Collected Data: Archive via Utility
    Exfiltration   T1048   Exfiltration Over Alternative Protocol
    Exfiltration   T1537   Transfer Data to Cloud Account
    Exfiltration   T1567.002   Exfiltration Over Web Service: Exfiltration to Cloud Storage
    Impact   T1486   Data Encrypted for Impact
    Impact   T1490   Inhibit System Recovery
    Impact     T1657   Financial Theft

    Lumma

    Lumma Stealer is a highly sophisticated information-stealing malware-as-a-service (MaaS) platform developed in C that emerged in 2022. It targets comprehensive user data, including browser credentials, cookies, cryptocurrency wallets (MetaMask, Electrum, Exodus), 2FA extensions, and can install additional malware through its loader module. The malware operates under a subscription model with multiple tiers, allowing cybercriminals to access a control panel for building binaries and managing stolen data. Microsoft tracks the primary developer and infrastructure operator as Storm-2477, with notable ransomware groups such as Octo Tempest, Storm-1607, Storm-1113, and Storm-1674 using Lumma in their campaigns.

    The most significant recent development occurred in May 2025 when Microsoft’s Digital Crimes Unit and international law enforcement executed a major takedown operation, seizing over 2,300 malicious domains and disrupting core infrastructure. However, July 2025 intelligence reveals a concerning resurgence. From June through July, targeted accounts steadily returned to pre-takedown levels, indicating operators quickly reestablished operations. The threat actors have adapted with enhanced evasion tactics, including shifting away from Cloudflare to alternative providers, such as Russian-based Selectel, leveraging more covert distribution channels, and avoiding public underground forums. Current distribution methods include fake software cracks via malvertising, ClickFix techniques on compromised websites, AI-generated GitHub repositories advertising game cheats, and social media campaigns on YouTube and Facebook promoting cracked software.

    Infrastructure

    Recent IOCs

    Recent IOCs

    Related File(s)
    SHA256 Filename(s)

    6020ef15813a6eccb99e34ccf53823b9dc04ff6fb8f8206d2e3762c4ca7d9e42

    core.exe

    fe69e8db634319815270aa0e55fe4b9c62ce8e62484609c3a42904fbe5bb2ab3

    WindowsSecurity.exe
    Related Domain Name(s)
    itumshop[.]com
    haciver[.]com
    Related IP Address(es)
    208.95.112[.]1
    178.236.252[.]252

    • Victimology
      Recently targeted business sectors: IT services, hospitality
      Capabilities

    • MITRE ATT&CK Techniques

    Tactic Technique ID Technique Name
    Defense Evasion   T1218.005   System Binary Proxy Execution: Mshta
    Persistence   T1574   Hijack Execution Flow
    Execution   T1059.001   Command and Scripting Interpreter: PowerShell
    Defense Evasion   T1027   Obfuscated Files or Information
    Defense Evasion   T1202   Indirect Command Execution
    Initial Access   T1189   Drive-by Compromise
    Defense Evasion   T1140   Deobfuscate/Decode Files or Information
    Command and Control   T1573.002   Encrypted Channel: Asymmetric Cryptography
    Execution   T1059.010   Command and Scripting Interpreter: AutoHotKey & AutoIT
    Credential Access   T1555   Credentials from Password Stores
    Credential Access   T1555.003   Credentials from Password Stores: Credentials from Web Browsers
    Collection   T1119   Automated Collection
    Defense Evasion, Persistence   T1574.001   Hijack Execution Flow: DLL Search Order Hijacking
    Defense Evasion   T1218.015   System Binary Proxy Execution: Electron Applications
    Defense Evasion   T1027.010   Obfuscated Files or Information: Command Obfuscation
    Defense Evasion   T1027.013   Obfuscated Files or Information: Encrypted/Encoded File
    Defense Evasion   T1553.002   Subvert Trust Controls: Code Signing
    Defense Evasion   T1562.001   Impair Defenses: Disable or Modify Tools
    Persistence   T1176.001   Software Extensions: Browser Extensions
    Discovery   T1217   Browser Information Discovery

    Latrodectus

    Latrodectus is a sophisticated malware loader that has emerged as the successor to IcedID. Believed to be developed by the Lunar Spider threat group, the same actors behind IcedID, Latrodectus operates as a downloader/loader designed to gain initial access to systems and deploy additional malicious payloads. It employs sophisticated techniques such as obfuscation, encryption, and anti-debugging mechanisms to evade detection, with the malware masquerading as legitimate AV components in some DLL files. The malware has evolved rapidly since its November 2023 emergence, with version 1.4 (July 2024) introducing AES256 encryption, new backdoor commands, and improved obfuscation techniques.

    Recent intelligence from mid-2025 shows Latrodectus made its debut in the top 10 threat list during April 2025, coinciding with the US tax season, with activity increasing until the end of April. Current campaigns target financial, automotive, and healthcare sectors through phishing emails containing PDF or HTML attachments that impersonate DocuSign documents or display fake error messages. The malware has been distributed via fake CAPTCHA lures and continues to be delivered by initial access brokers TA577 and TA578, with recent samples reportedly delivering LummaC2 infostealer. Despite being targeted in Operation Endgame in May 2024, Latrodectus operators quickly rebuilt their infrastructure and resumed operations by late June 2024, often using Brute Ratel C4 as a delivery mechanism.

    Aliases

    • BlackWidow, IceNova, Lotus, or Unidentified 111

    Infrastructure

    Recent IOCs 

    Related File(s)
    SHA256 Filename(s)

    c5357886504980d768f4a5b04e0c2c97b3df77087ae3be6bae82d75381331013

    open.msi

    3e48db8ec93ac99c36d6d618df69863fdb8eb751d40b7266b0d38b87896f5472

    wtsapi32.dll
    Related Domain Name(s)
    wlisd[.]com
    Related IP Address(es)
    50.10.11[.]52

    • Victimology
      Recently targeted business sectors: Manufacturing, non-profit
      Capabilities

    • MITRE ATT&CK Techniques

    Tactic Technique ID Technique Name
    Defense Evasion   T1027.001   Obfuscated Files or Information: Binary Padding
    Resource Development   T1588.003   Obtain Capabilities: Code Signing Certificates
    Defense Evasion   T1027.010   Obfuscated Files or Information: Command Obfuscation
    Execution   T1559.001   Inter-Process Communication: Component Object Model
    Collection   T1005   Data from Local System
    Defense Evasion   T1622   Debugger Evasion
    Defense Evasion   T1140   Deobfuscate/Decode Files or Information
    Defense Evasion   T1562.002   Impair Defenses: Disable Windows Event Logging
    Discovery   T1087.002   Account Discovery: Domain Account
    Discovery   T1069.002   Permission Groups Discovery: Domain Groups
    Discovery   T1482   Domain Trust Discovery
    Initial Access   T1189   Drive-by Compromise
    Defense Evasion   T1027.007   Obfuscated Files or Information: Dynamic API Resolution
    Defense Evasion   T1055.001   Process Injection: Dynamic-link Library Injection
    Defense Evasion   T1027.009   Obfuscated Files or Information: Embedded Payloads

    New detections

    The following is a list of new detection signatures added to the ConnectWise SIEM in July 2025.

    [CRU][Windows] PowerShell basic parsing URL obfuscation

    Detects the use of BasicParsing in a PowerShell web request to obfuscate the URL by splitting it into smaller pieces and relying on the parser to piece that request back together at request time. This kind of behavior is unusual and is never seen in legitimate usage, as it serves no practical purpose other than to obfuscate the URL being requested.

    [EA][CRU][Windows] Suspicious PuTTY activity

    This alert aims to detect re-named PuTTY executables and any network connections to suspicious ports from any PuTTY executable. Any network connections for this process or any surrounding activity for the user should be investigated for signs of data exfiltration or malicious file downloads.

    [EA][Windows] USB mass storage device connected and data transfer detected

    To detect potential data exfiltration via USB mass storage devices on Windows systems, ensure that auditing is enabled for Event ID 6416 (Plug and Play activity) and that Audit Removable Storage is configured under Object Access to capture Event ID 4663 (file access events). This detection monitors USB device connections initiated by the Windows Driver Foundation Host process (WUDFHost.exe), the registration of USB storage devices within the system, and any subsequent file write operations to those devices, which may indicate unauthorized data transfers.

    [O365] Possible vishing attack via Teams chat from foreign tenant user

    Detects possible Teams vishing attempts. This rule triggers on the possible first stage of a social engineering attack on a victim, where the attacker prompts the user to install a remote access tool subsequent to creating a “OneOnOne” Teams chat. The attacker account will show as the “UserId,” and typically with a display name indicating a help desk or Admin role. This account is seen along with the victim account in the “Members.DisplayName” field. False positives may occur for legitimate help desk or admin assistance Teams chats.

    [Windows] Recursive execution chain

    This detection identifies a suspicious recursive execution pattern where cmd.exe spawns another cmd.exe multiple times using the /c flag. This behavior is often associated with obfuscation techniques used by adversaries to evade detection, delay execution, or complicate process trees during forensic analysis. While legitimate use is rare, this pattern is commonly seen in malware or script-based attacks.

    [pfSense] Multiple failed authentication attempts via web or SSH

    This detection identifies multiple failed authentication attempts on pfSense devices via the web interface or SSH. Repeated login failures may indicate a brute-force attack or unauthorized access attempts.

    [pfSense] Configuration change

    This detection identifies configuration changes made to a pfSense firewall device. Such changes may indicate administrative activity, but they can also be a sign of unauthorized or suspicious modifications to firewall rules or system settings.

    [pfSense] New user account created

    This detection identifies the creation of a new user account on a pfSense firewall device. Unauthorized user creation on network infrastructure devices such as firewalls can indicate malicious activity, such as an attacker establishing persistence or a misconfigured automation process.

    [pfSense] New user account deleted

    This detection highlights the deletion of a user account on a pfSense firewall device. Unauthorized removal of user accounts can indicate malicious activity, such as an attacker attempting to cover their tracks or disrupt administrative access.

    [Windows] PowerShell execution via IIS worker process: Potential ToolShell exploit

    This detection identifies instances where the IIS worker process (w3wp.exe) spawns cmd.exe, which in turn executes PowerShell. This behavior is highly suspicious. False positives may include legitimate administrative scripts triggered via IIS (e.g., scheduled tasks or maintenance scripts).

    [IIS] Possible SharePoint ToolShell attempt - CVE-2025-53770 and CVE-2025-53771

    Detects potential exploitation of SharePoint via ToolPane.aspx tied to CVE-2025-53770/53771. These flaws may let attackers run commands or load tools through crafted HTTP requests. Confirm if the endpoint is on-prem SharePoint. If so, ensure it’s fully patched, up to date, and machine keys are rotated. See the official CISA advisory for more details.

    [EA][O365] Suspicious HTTP client user agent followed by security alert (possible AiTM)

    Detects a possible account take over (ATO) via credential theft, subsequently followed by a Microsoft security alert from a Microsoft 365 tenant. Observed user agents are weaponized HTTP client tools used to bypass Microsoft 365 MFA controls. This alert is a frequent true positive; we recommend investigating this activity. The “UserId” account should match the “userStates. userPrincipalName” account. Due to Microsoft licensing limits, the “userStates.userPrincipalName” may not populate, but both rules are correlated by the user key, an alternative ID for the user.

    [EA][O365] Suspicious HTTP client user agent followed by risk detection (possible AiTM)

    Detects a possible account take over (ATO) via credential theft, subsequently followed by a Microsoft risk detection. Observed user agents are weaponized HTTP client tools used to bypass Microsoft 365 MFA controls. This alert is a frequent true positive; we recommend investigating this activity. The “UserId” account should match the “userPrincipalName” account.

    [Azure] Possible credential leak: Successful sign-in blocked by conditional access

    Detects a user sign-in using a valid password which is subsequently blocked by a conditional access policy. This can indicate possible usage of valid credentials by an attacker. If the sign-in is blocked by a GeoBlocks policy, an attacker may be able to use a VPN or otherwise spoof locations or other parameters of the policy to bypass the CAP block. We recommend investigating this activity.

    Related Articles