{"id":99621,"date":"2021-10-25T00:01:18","date_gmt":"2021-10-25T07:01:18","guid":{"rendered":""},"modified":"2025-06-23T02:03:55","modified_gmt":"2025-06-23T09:03:55","slug":"nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/","title":{"rendered":"NOBELIUM targeting delegated administrative privileges to facilitate broader attacks"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">The Microsoft Threat Intelligence Center (MSTIC) has <a href=\"https:\/\/aka.ms\/nobelium_oct2021_moti\" target=\"_blank\" rel=\"noopener\">detected nation-state activity<\/a> associated with the threat actor tracked as NOBELIUM, attempting to gain access to downstream customers of multiple cloud service providers (CSP), managed service providers (MSP), and other IT services organizations (referred to as \u201cservice providers\u201d for the rest of this blog) that have been granted administrative or privileged access by other organizations. The targeted activity has been observed against organizations based in the United States and across Europe since May 2021. MSTIC assesses that NOBELIUM has launched a campaign against these organizations to exploit existing technical trust relationships between the provider organizations and the governments, think tanks, and other companies they serve. NOBELIUM is the same actor behind the SolarWinds compromise in 2020, and this latest activity shares the hallmarks of the actor\u2019s compromise-one-to-compromise-many approach. Microsoft has notified known victims of these activities through our nation-state notification process and worked with them and other industry partners to expand our investigation, resulting in new insights and disruption of the threat actor throughout stages of this campaign.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft has observed NOBELIUM targeting privileged accounts of service providers to move laterally in cloud environments, leveraging the trusted relationships to gain access to downstream customers and enable further attacks or access targeted systems. These attacks are not the result of a product security vulnerability but rather a continuation of NOBELIUM\u2019s use of a diverse and dynamic toolkit that includes sophisticated malware, password sprays, supply chain attacks, token theft, API abuse, and spear phishing to compromise user accounts and leverage the access of those accounts. These attacks have highlighted the need for administrators to adopt strict account security practices and take additional measures to secure their environments.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In the observed supply chain attacks, downstream customers of service providers and other organizations are also being targeted by NOBELIUM. In these provider\/customer relationships, customers delegate administrative rights to the provider that enable the provider to manage the customer\u2019s tenants as if they were an administrator within the customer\u2019s organization. By stealing credentials and compromising accounts at the service provider level, NOBELIUM can take advantage of several potential vectors, including but not limited to delegated administrative privileges (DAP), and then leverage that access to extend downstream attacks through trusted channels like externally facing VPNs or unique provider-customer solutions that enable network access. To reduce the potential impact of this NOBELIUM activity, Microsoft encourages all of our partners and customers to immediately review the guidance below and implement risk mitigations, harden environments, and investigate suspicious behaviors that match the tactics described in this blog. MSTIC continues to observe, monitor, and notify affected customers and partners through our nation-state notification process. Microsoft Detection and Response Team (DART) and Microsoft Threat Experts have also engaged directly with affected customers to assist with incident response and drive better detection and guidance around this activity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"post-exploitation-patterns-against-downstream-targets\">Post-exploitation patterns against downstream targets<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">A key trait of NOBELIUM\u2019s ongoing activity over the last year has been the abuse of indirect paths and trust relationships to target and gain access to victims of interest for intelligence gain. In the most recent campaign, this has manifested in a compromise-one-to-compromise-many approach\u2014exploiting the service providers&#8217; trust chain to gain broad access to multiple customer tenants for subsequent attacks. NOBELIUM leverages established standard business practices, to target downstream customers across multiple managed tenants. These delegated administrative privileges are often neither audited for approved use nor disabled by a service provider or downstream customer once use has ended, leaving them active until removed by the administrators. If NOBELIUM has compromised the accounts tied to delegated administrative privileges through other credential-stealing attacks, that access grants actors like NOBELIUM persistence for ongoing campaigns.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In one example intrusion chain observed by MSTIC during this campaign, the actor was observed chaining together artifacts and access across four distinct providers to reach their end target. The example demonstrates the breadth of techniques that the actor leverages to exploit and abuse trust relationships to accomplish their objective.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"671\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture1-6175cf463b3e5.png\" alt=\"Example intrusion conducted by NOBELIUM demonstrating nested access across variety of methods \" class=\"wp-image-99627\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture1-6175cf463b3e5.png 975w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture1-6175cf463b3e5-300x206.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture1-6175cf463b3e5-768x529.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Figure 1: Example intrusion conducted by NOBELIUM demonstrating nested access across variety of methods.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft assesses that organizations, such as cloud service providers and other technology organizations who manage services on behalf of downstream customers, will be of continued interest to persistent threat actors and are at risk for targeting via a variety of methods, from credential access to targeted social engineering via legitimate business processes and procedures. For additional information on how to identify and triage delegated administrative privileges, see the mitigations and recommendations below.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mitigation-and-remediation\">Mitigation and remediation<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft recommends that cloud service providers, other technology organizations with elevated privileges for customer systems, and all downstream customers of these organizations review and implement the following actions to help mitigate and remediate the recent NOBELIUM activity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"if-you-are-a-cloud-service-provider-or-an-organization-who-relies-on-elevated-privileges\">If you are a cloud service provider or an organization who relies on elevated privileges<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"1-verify-and-monitor-compliance-with-microsoft-partner-center-security-requirements\">1. Verify and monitor compliance with Microsoft Partner Center security requirements<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">All Microsoft partners should review and verify overall compliance status with the <a href=\"https:\/\/docs.microsoft.com\/partner-center\/partner-security-requirements\" target=\"_blank\" rel=\"noopener\">partner security requirements<\/a> through the Microsoft Partner Center. Microsoft recommends the following:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Ensure multifactor authentication (MFA) is in use and conditional access policies are enforced<\/strong>: All Microsoft partners are required to use MFA to access Partner Center and for cross-tenant access to customer tenants in Microsoft commercial clouds. Partners are advised to <a href=\"https:\/\/docs.microsoft.com\/partner-center\/partner-security-compliance#multi-factor-authentication-mfa-report\" target=\"_blank\" rel=\"noopener\">check their security compliance in Partner Center<\/a> and monitor if any user logins or API calls are not compliant with MFA enforcement. Partners should <a href=\"https:\/\/partner.microsoft.com\/commerce\/security\/compliance\" target=\"_blank\" rel=\"noopener\">stay compliant<\/a> at all times.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Adopt the Secure Application Model Framework<\/strong>: All partners integrating with Partner Center APIs must adopt the <a href=\"https:\/\/docs.microsoft.com\/partner-center\/develop\/enable-secure-app-model\" target=\"_blank\" rel=\"noopener\">Secure Application Model framework<\/a> for any app and user auth model applications.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Check the Partner Center Activity Logs<\/strong>: partners are advised to regularly check the <a href=\"https:\/\/partner.microsoft.com\/en-us\/dashboard\/commerce2\/auditrecords\/list\" target=\"_blank\" rel=\"noopener\">&#8220;Activity Log&#8221; in Partner Center<\/a> to monitor any user activities, including high privileged user creations, high privileged user role assignment, etc. Partners can also use <a href=\"https:\/\/docs.microsoft.com\/partner-center\/develop\/get-a-record-of-partner-center-activity-by-user\" target=\"_blank\" rel=\"noopener\">Partner Center Activity Log APIs<\/a> to create a custom security dashboard on key user activities in Partner Center to proactively detect suspicious activities.<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"2-remove-delegated-administrative-privileges-dap-connection-when-not-in-use\">2. Remove delegated administrative privileges (DAP) connection when not in use<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">To improve security, Microsoft recommends that partners remove delegated administrative privileges that are no longer in use. Starting in November, a <a href=\"https:\/\/docs.microsoft.com\/partner-center\/announcements\/2021-september#11\" target=\"_blank\" rel=\"noopener\">new reporting tool<\/a> will be available that identifies and displays all active delegated administrative privilege connections and will help organizations to discover unused delegated administrative privileges connections. This tool will provide reporting that captures how partner agents are accessing customer tenants through those privileges and will allow partners to remove the connection when not in use.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>We are offering service providers a <a href=\"https:\/\/docs.microsoft.com\/partner-center\/announcements\/2021-october#12\" target=\"_blank\" rel=\"noopener\">free two year subscription of Azure Active Directory Premium Plan 2<\/a><\/strong> to further help them manage and get reports on access privileges. Registered partners can <a href=\"https:\/\/partner.microsoft.com\/resources\/detail\/cybersecurity-with-azure-ad-pdf\">log onto Partner Center to take advantage of this offer<\/a>. Azure AD Premium Plan 2 provides extended access to sign-in logs and premium features such as Azure AD Privileged Identity Management (PIM) and risk-based Conditional Access capabilities to strengthen security controls.<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"3-conduct-a-thorough-investigation-and-comprehensive-response\">3.&nbsp; Conduct a thorough investigation and comprehensive response.<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Carry out additional investigations if you think you might have been affected to determine the full scope of compromised users\/assets. Microsoft recommends the following:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Review the <a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/fundamentals\/security-operations-introduction\" target=\"_blank\" rel=\"noopener\">Azure AD Security Operations Guide<\/a> to audit or establish your security operations<\/strong>. If you are a cloud service provider or an organization that relies on elevated privileges, you need to assess the security implications in your network and its connectivity for your customers. In particular, review authentications that are associated with Azure AD configuration changes using the <a href=\"https:\/\/docs.microsoft.com\/exchange\/security-and-compliance\/exchange-auditing-reports\/search-role-group-changes\" target=\"_blank\" rel=\"noopener\">Microsoft 365 compliance center<\/a> (formerly in the Exchange admin center) or <a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/reports-monitoring\/concept-audit-logs\" target=\"_blank\" rel=\"noopener\">Azure AD admin logs<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Adequate log retention procedures for cloud-based resources are critical to effectively identify, respond to, and remediate malicious activity<\/strong>. Cloud service providers and other technology organizations often configure individual subscriptions to meet specific customer requirements. These configurations might not include security controls that enable full accountability to administrative actions should an incident occur. We encourage all organizations to become familiar with logs made available within your subscription and routinely evaluate them for adequacy and anomalies.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">General <a href=\"https:\/\/docs.microsoft.com\/security\/compass\/incident-response-playbooks\" target=\"_blank\" rel=\"noopener\">Incident response playbooks for Phishing and Password spray<\/a> are available in Microsoft Security Best Practices.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"if-you-are-a-downstream-customer\">If you are a downstream customer<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"1-review-audit-and-minimize-access-privileges-and-delegated-permissions\">1.&nbsp; Review, audit, and minimize access privileges and delegated permissions<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">It is important to consider and implement a least-privilege approach. Microsoft recommends prioritizing a thorough <a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/commerce\/manage-partners?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\">review and audit of partner relationships<\/a> to minimize any unnecessary permissions between your organization and upstream providers. Microsoft recommends immediately removing access for any partner relationships that look unfamiliar or have not yet been audited.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Review, harden, and monitor all tenant administrator accounts<\/strong>: All organizations should thoroughly review all tenant admin users, including those associated with <a href=\"https:\/\/docs.microsoft.com\/partner-center\/azure-plan-manage\" target=\"_blank\" rel=\"noopener\">Administer On Behalf Of (AOBO)<\/a> in Azure subscriptions and verify the authenticity of the users and activity. We strongly encourage the use of strong authentication for all tenant administrators, review of devices registered for use with MFA, and minimize the use of standing high-privilege access. Continue to reinspect all active tenant admin users accounts and check audit logs on a regular basis to verify that high-privilege user access is not granted or delegated to admin users who do not require these to do their job.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Review service provider permissions access from B2B and local accounts<\/strong>: In addition to using the delegated administrative privilege capabilities, some cloud service providers use business-to-business (B2B) accounts or local administrator accounts in customer tenants. We recommend that you identify whether your cloud service providers use these, and if so, ensure those accounts are well-governed, and have least-privilege access in your tenant. Microsoft recommends against the use of \u201cshared\u201d administrator accounts. Review the <a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/external-identities\/auditing-and-reporting\" target=\"_blank\" rel=\"noopener\">detailed guidance<\/a> on how to review permissions for B2B accounts.<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"2-verify-multi-factor-authentication-mfa-is-enabled-and-enforce-conditional-access-policies\">2. Verify multi-factor authentication (MFA) is enabled and enforce conditional access policies<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">MFA is the best baseline security hygiene method to protect against threats. Follow the detailed guidance on <a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/admin\/security-and-compliance\/set-up-multi-factor-authentication\" target=\"_blank\" rel=\"noopener\">setting up multifactor authentication<\/a> in Microsoft 365, as well as the guidance on <a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/conditional-access\/plan-conditional-access\" target=\"_blank\" rel=\"noopener\">deploying and configuring conditional access policies<\/a> in Azure Active Directory (Azure AD).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"3-review-and-audit-logs-and-configurations\">3. Review and audit logs and configurations<\/h4>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Review and audit Azure AD sign-ins and configuration changes<\/strong>: Authentications of this nature are audited and available to customers through the <a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/reports-monitoring\/concept-sign-ins\">Azure AD sign in logs<\/a>, <a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/reports-monitoring\/concept-audit-logs\">Azure AD audit logs<\/a>, and the <a href=\"https:\/\/docs.microsoft.com\/exchange\/security-and-compliance\/exchange-auditing-reports\/search-role-group-changes\" target=\"_blank\" rel=\"noopener\">Microsoft 365 compliance center<\/a> (formerly in the Exchange Admin Center). We recently added the capability to see sign-ins by partners who have delegated admin permissions. You can see a filtered view of these sign-ins by navigating to the <a href=\"https:\/\/aad.portal.azure.com\/#blade\/Microsoft_AAD_IAM\/ActiveDirectoryMenuBlade\/SignIns\">sign-in logs in the Azure AD admin portal<\/a>, and adding a filter \u2018Cross-tenant access type: Service provider\u2019 on the \u2018User-sign ins (non-interactive)\u2019 tab.<figure><img loading=\"lazy\" decoding=\"async\" width=\"3163\" height=\"983\" class=\"alignnone wp-image-99630 size-full\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture2-6175d12a61201.png\" alt=\"TBA\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture2-6175d12a61201.png 3163w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture2-6175d12a61201-300x93.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture2-6175d12a61201-1024x318.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture2-6175d12a61201-768x239.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture2-6175d12a61201-1536x477.png 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture2-6175d12a61201-2048x636.png 2048w\" sizes=\"auto, (max-width: 3163px) 100vw, 3163px\" \/><\/figure><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Review Existing Log Availability and Retention Strategies<\/strong>: Investigating activities conducted by malicious actors places a large emphasis on having adequate log retention procedures for cloud-based resources including Office 365. Various subscription levels have individualized log availability and retention policies which are important to understand prior to forming an incident response procedure.<\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">We encourage all organizations to become familiar with logs made available within your subscription and routinely evaluate them for adequacy and anomalies. For organizations relying on a third-party organization, work with them to understand their logging strategy for all administrative actions and establish a process should logs need to be made available during an incident.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"observed-behaviors-and-ttps\">Observed behaviors and TTPs<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Unique indicators (e.g., specific IPs, domains, hashes) have limited value in detecting global NOBELIUM activity because the indicators are mostly compartmented by campaign and specific to the targeted organization. They also regularly obfuscate their attack by shifting infrastructure and maintain very tight operational security around their campaigns. Despite this, the following behaviors and characteristics are common to NOBELIUM intrusions and should be reviewed closely during investigations to help determine if an organization has been affected:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">NOBELIUM leverages \u201canonymous\u201d infrastructure, which may include low reputation proxy services, cloud hosting services, and TOR, to authenticate to victims<\/li>\n\n\n\n<li class=\"wp-block-list-item\">NOBELIUM has been observed leveraging scripted capabilities, including but not limited to <a href=\"https:\/\/github.com\/dirkjanm\/ROADtools\">RoadTools<\/a> or <a href=\"https:\/\/github.com\/Gerenios\/AADInternals\">AADInternals<\/a>, to conduct enumeration of Azure AD, which can result in authentication with user agents of scripting environments<\/li>\n\n\n\n<li class=\"wp-block-list-item\">NOBELIUM has been observed authenticating to accounts from anomalous locations that might trigger impossible travel analytics or fail to pass deployed <a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/conditional-access\/concept-conditional-access-policy-common\" target=\"_blank\" rel=\"noopener\">conditional access policies<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">NOBELIUM has been observed modifying Azure AD to enable long-term persistence and access to sensitive information. This can include the creation of users, consent of Azure AD applications, granting of roles to users and applications, creation of additional service principal credentials, and more. More information at <a href=\"https:\/\/aka.ms\/nobelium\">https:\/\/aka.ms\/nobelium<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">In one incident, MSTIC observed the use of Azure RunCommand, paired with Azure admin-on-behalf-of (AOBO), as a technique to gain access to virtual machines and shift access from cloud to on-premise.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">NOBELIUM has demonstrated an ongoing interest in targeting privileged users, including Global Administrators. Security of at-risk organizations is greatly enhanced by prioritizing events that are detected on privileged accounts.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">NOBELIUM is frequently observed conducting activities consistent with intelligence collection. Routinely monitoring various log sources for anomalies consistent with data exfiltration can serve as an early warning for compromise.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Organizations previously targeted by NOBELIUM might experience recurring activity and would benefit from implementing proactive monitoring for new attacks.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"detection-and-investigation-through-advanced-hunting-queries\">Detection and Investigation through Advanced Hunting queries<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">For Microsoft customers using Azure Sentinel, Microsoft 365 Defender, Microsoft Cloud App Security, or registered partners taking advantage of the <a href=\"https:\/\/partner.microsoft.com\/resources\/detail\/cybersecurity-with-azure-ad-pdf\">free two year subscription of Azure Active Directory Premium Plan 2<\/a>, any of the following in-product detections, investigation guidance, and hunting queries can help organizations accelerate their investigations into this activity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"azure-sentinel\">Azure Sentinel<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Azure Sentinel customers can use the following detection queries to look for this activity:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"detections\">Detections<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Name<\/strong>: Azure VM Run Command operations executing a unique PowerShell script<br><strong>Description<\/strong>: This query identifies when the Azure Run command is used to execute a unique PowerShell script on a virtual machine. The uniqueness of the PowerShell script is determined by taking a combined hash of the cmdlets it imports and the file size of the PowerShell script. Alerts from this detection indicate a unique PowerShell was executed in your environment.<br><strong>URL<\/strong>: <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Detections\/AzureActivity\/RareRunCommandPowerShellScript.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Detections\/AzureActivity\/RareRunCommandPowerShellScript.yaml<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Name<\/strong>: Azure VM Run Command operation executed during suspicious login window<br><strong>Description<\/strong>: This query identifies when the Azure Run command execution event is associated with a user and IP Address that has recently been associated by an Azure Sentinel UEBA user entity behavior alert.<br><strong>URL<\/strong>: <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Detections\/MultipleDataSources\/RunCommandUEBABreach.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Detections\/MultipleDataSources\/RunCommandUEBABreach.yaml<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Name<\/strong>: Azure Portal Sign-in from another Azure Tenant<br><strong>Description<\/strong>: This query looks for sign-in attempts to the Azure Portal where the user who is signing in from another Azure tenant, and the IP address the login attempt is from is an Azure IP. A threat actor who compromises an Azure tenant may look to pivot to other tenants leveraging cross-tenant delegated access in this manner.<br><strong>URL<\/strong>: <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Detections\/SigninLogs\/AzurePortalSigninfromanotherAzureTenant.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Detections\/SigninLogs\/AzurePortalSigninfromanotherAzureTenant.yaml<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"hunting-queries\">Hunting Queries<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Name<\/strong>: Azure VM Run Command executed from Azure IP address<br><strong>Description<\/strong>: This query identifies any Azure VM Run Command operation executed from an Azure IP address. The Run Command allows an attacker or legitimate user to execute arbitrary PowerShell on a target VM.<br><strong>URL<\/strong>: <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Hunting%20Queries\/AzureActivity\/AzureRunCommandFromAzureIP.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Hunting%20Queries\/AzureActivity\/AzureRunCommandFromAzureIP.yaml<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Name<\/strong>: Azure VM Run Command linked with MDE<br><strong>Description<\/strong>: This query identifies any Azure VM Run Command operations and links these operations with MDE host logging. Logging from AzureActivity provides the IP address and user name of the account that invoked the command. The MDE data provides insights into what cmdlets were loaded by the command.<br><strong>URL<\/strong>: <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Hunting%20Queries\/MultipleDataSources\/AzureRunCommandMDELinked.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Hunting%20Queries\/MultipleDataSources\/AzureRunCommandMDELinked.yaml<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Name<\/strong>: Dormant Service Principal Update Creds and Logs In<br><strong>Description<\/strong>: This query look for Service Principal accounts that are no longer used where a user has added or updated credentials for them before logging in with the Service Principal.<br><strong>URL<\/strong>: <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Hunting%20Queries\/MultipleDataSources\/DormantServicePrincipalUpdateCredsandLogsIn.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Hunting%20Queries\/MultipleDataSources\/DormantServicePrincipalUpdateCredsandLogsIn.yaml<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Name<\/strong>: Dormant User Update MFA and Logs In<br><strong>Description<\/strong>: This query looks for user accounts that have not been successfully logged into recently, who then have a MFA method added or updated before logging in.<br><strong>URL<\/strong>: <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Hunting%20Queries\/MultipleDataSources\/DormantUserUpdateMFAandLogsIn.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Hunting%20Queries\/MultipleDataSources\/DormantUserUpdateMFAandLogsIn.yaml<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-365-defender\">Microsoft 365 Defender<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft 365 Defender provides detection for one of the cloud persistence techniques commonly used by NOBELIUM. That persistence technique relies on maintaining access to victims\u2019 mail system through the modification of permissions and addition of hidden credentials that allow the attacker to access emails remotely. This alert is based on a combination of multiple signals and telemetry that originates from Microsoft Cloud App Security and is triggered either based on the risk score of the account involved or based on the suspicious IP address used to access emails.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Detection Name<\/strong>: Suspicious Addition of an Exchange related App Role<br><strong>Description<\/strong>: Addition of an Exchange related application role was observed. An account that can authenticate against an application service principal may also be able to access Exchange data and email. This alert was triggered based on another Microsoft Cloud App Security alert related to the potentially compromised user account.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-cloud-application-security\">Microsoft Cloud Application Security<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Review and audit users and accounts and their activities<\/strong>: Microsoft Cloud App Security provides a quick page to enumerate all the users and accounts but filtering specifically to find \u201cexternal\u201d users with admin privilege. Once these users and accounts are identified, Cloud App Security can assist to review some of the activities performed and recent sign-ins and risk score.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1430\" height=\"354\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture3-617620e192d28.png\" alt=\"\" class=\"wp-image-99657\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture3-617620e192d28.png 1430w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture3-617620e192d28-300x74.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture3-617620e192d28-1024x253.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Picture3-617620e192d28-768x190.png 768w\" sizes=\"auto, (max-width: 1430px) 100vw, 1430px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Cloud App Security also provides detection coverage for some of the NOBELIUM techniques mentioned in earlier sections of this blog, including detection of post-exploitation activities related to manipulation of privileged credentials and a new detection for password-spray typically used to obtain initial foothold.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Detection Name: <\/strong>Activity from password-spray associated IP address<br><strong>Description: <\/strong>This detection compares IP addresses performing successful activities in your cloud applications to IP addresses identified by Microsoft\u2019s threat intelligence sources as recently performing password spray attacks. It alerts about users that were victims of password spray campaigns and managed to access your cloud applications from those malicious IPs.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Detection Name: <\/strong>Unusual addition of credentials to an OAuth app<br><strong>Description: <\/strong>This detection identifies the suspicious addition of privileged credentials to an OAuth app, based on baseline behavior of activities learned by the product. This can indicate that an attacker has compromised the app, and is using it for malicious activity.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Detection Name<\/strong>: Unusual ISP for an OAuth app<br><strong>Description: <\/strong>This detection profiles your environment and triggers alerts when OAuth apps perform activities from an unusual ISP, which could indicate an attempted breach using a non-genuine OAuth provider.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"azure-defender\">Azure Defender<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Azure Defender provides detections for abuse of legitimate virtual machine extensions once an attacker has obtained token or valid credentials. Through deep analysis of Azure activity logs, Azure Defender analyzes every call made by authenticated and authorized principals and calculates a likelihood score to determine suspicious intent of the operation and detect it.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Detection Name<\/strong>: Suspicious Run Command invocation detected<br><strong>Description<\/strong>: Azure Defender for Resource Manager identified a suspicious Run Command invocation in your subscription. Azure Run Command is a feature designed to allow administrators to efficiently manage their environments. While this activity may be legitimate, an attacker with sufficient permissions can utilize Run Command to execute malicious code on your virtual machine. This activity is deemed suspicious as the user rarely invokes operations that enable code execution. This can indicate the account is compromised and is being used with malicious intent.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft continues to track NOBELIUM\u2019s <a href=\"https:\/\/msrc-blog.microsoft.com\/2020\/12\/21\/december-21st-2020-solorigate-resource-center\/\">activities<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/\">tactics<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/27\/foggyweb-targeted-nobelium-malware-leads-to-persistent-backdoor\/\">malware<\/a>, and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/28\/breaking-down-nobeliums-latest-early-stage-toolset\/\">tools<\/a>. &nbsp;We will communicate any additional insights and recommendations as we investigate their actions against our customers. We reinforce&nbsp;the importance of best&nbsp;practice&nbsp;security precautions&nbsp;such as Zero-trust architecture and multi-factor authentication&nbsp;and their&nbsp;importance&nbsp;for everyone.&nbsp;Additional information on best practice security priorities&nbsp;is&nbsp;listed below:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access-management\">Identity access management<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\">Zero trust<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/plan\/security-best-practices\/implementing-least-privilege-administrative-models\">Implementing least-privilege\u00a0access\u00a0models<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The Microsoft Threat Intelligence Center (MSTIC) has detected nation-state activity associated with the threat actor tracked as NOBELIUM, attempting to gain access to downstream customers of multiple cloud service providers (CSP), managed service providers (MSP), and other IT services organizations.<\/p>\n","protected":false},"author":117,"featured_media":99726,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3898,3828,3926],"threat-intelligence":[3727],"content-type":[3663],"job-role":[],"product":[3702,3703],"topic":[3687],"coauthors":[3380],"class_list":["post-99621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-elevation-of-privilege","tag-midnight-blizzard-nobelium","tag-token-theft","threat-intelligence-attacker-techniques-tools-and-infrastructure","content-type-research","product-microsoft-entra","product-microsoft-entra-id","topic-threat-intelligence","review-flag-1694638265-576","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-disabled","review-flag-lever-1694638263-909","review-flag-new-1694638263-340","review-flag-on-pr-1694638271-294","review-flag-partn-1694638263-177","review-flag-vm-1694638271-244"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NOBELIUM targeting delegated administrative privileges to facilitate broader attacks | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NOBELIUM targeting delegated administrative privileges to facilitate broader attacks | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"The Microsoft Threat Intelligence Center (MSTIC) has detected nation-state activity associated with the threat actor tracked as NOBELIUM, attempting to gain access to downstream customers of multiple cloud service providers (CSP), managed service providers (MSP), and other IT services organizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-25T07:01:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-23T09:03:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/SEC20_Security_027.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Microsoft Threat Intelligence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled-6175d431a6a9f.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Threat Intelligence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Threat Intelligence\"}],\"headline\":\"NOBELIUM targeting delegated administrative privileges to facilitate broader attacks\",\"datePublished\":\"2021-10-25T07:01:18+00:00\",\"dateModified\":\"2025-06-23T09:03:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/\"},\"wordCount\":3324,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/SEC20_Security_027.jpg\",\"keywords\":[\"Elevation of privilege\",\"Midnight Blizzard (NOBELIUM)\",\"Token theft\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/\",\"name\":\"NOBELIUM targeting delegated administrative privileges to facilitate broader attacks | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/SEC20_Security_027.jpg\",\"datePublished\":\"2021-10-25T07:01:18+00:00\",\"dateModified\":\"2025-06-23T09:03:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/SEC20_Security_027.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/SEC20_Security_027.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Lightly bearded man working on a laptop while sitting next to another person on a dark blue couch.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NOBELIUM targeting delegated administrative privileges to facilitate broader attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/8421426d40de1341b269eaec592eaca5\",\"name\":\"Teri Seals-Dormer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/4f1c6b1df49619573e006bda75a18efb7f99db184762acc79d899b8a6ef768aa?s=96&d=microsoft&r=g98331fbdc1fedab03f83292cd9dfa932\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4f1c6b1df49619573e006bda75a18efb7f99db184762acc79d899b8a6ef768aa?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4f1c6b1df49619573e006bda75a18efb7f99db184762acc79d899b8a6ef768aa?s=96&d=microsoft&r=g\",\"caption\":\"Teri Seals-Dormer\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/tsealsdormer\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NOBELIUM targeting delegated administrative privileges to facilitate broader attacks | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/","og_locale":"en_US","og_type":"article","og_title":"NOBELIUM targeting delegated administrative privileges to facilitate broader attacks | Microsoft Security Blog","og_description":"The Microsoft Threat Intelligence Center (MSTIC) has detected nation-state activity associated with the threat actor tracked as NOBELIUM, attempting to gain access to downstream customers of multiple cloud service providers (CSP), managed service providers (MSP), and other IT services organizations.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/","og_site_name":"Microsoft Security Blog","article_published_time":"2021-10-25T07:01:18+00:00","article_modified_time":"2025-06-23T09:03:55+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/SEC20_Security_027.jpg","type":"image\/jpeg"}],"author":"Microsoft Threat Intelligence","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/Untitled-6175d431a6a9f.png","twitter_misc":{"Written by":"Microsoft Threat Intelligence","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/","@type":"Person","@name":"Microsoft Threat Intelligence"}],"headline":"NOBELIUM targeting delegated administrative privileges to facilitate broader attacks","datePublished":"2021-10-25T07:01:18+00:00","dateModified":"2025-06-23T09:03:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/"},"wordCount":3324,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/SEC20_Security_027.jpg","keywords":["Elevation of privilege","Midnight Blizzard (NOBELIUM)","Token theft"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/","name":"NOBELIUM targeting delegated administrative privileges to facilitate broader attacks | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/SEC20_Security_027.jpg","datePublished":"2021-10-25T07:01:18+00:00","dateModified":"2025-06-23T09:03:55+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/SEC20_Security_027.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/10\/SEC20_Security_027.jpg","width":1200,"height":800,"caption":"Lightly bearded man working on a laptop while sitting next to another person on a dark blue couch."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"NOBELIUM targeting delegated administrative privileges to facilitate broader attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/8421426d40de1341b269eaec592eaca5","name":"Teri Seals-Dormer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4f1c6b1df49619573e006bda75a18efb7f99db184762acc79d899b8a6ef768aa?s=96&d=microsoft&r=g98331fbdc1fedab03f83292cd9dfa932","url":"https:\/\/secure.gravatar.com\/avatar\/4f1c6b1df49619573e006bda75a18efb7f99db184762acc79d899b8a6ef768aa?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4f1c6b1df49619573e006bda75a18efb7f99db184762acc79d899b8a6ef768aa?s=96&d=microsoft&r=g","caption":"Teri Seals-Dormer"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/tsealsdormer\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/99621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=99621"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/99621\/revisions"}],"predecessor-version":[{"id":139861,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/99621\/revisions\/139861"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/99726"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=99621"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=99621"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=99621"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=99621"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=99621"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=99621"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=99621"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=99621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}