Azure-Sentinel/Sample Data/MITRE ATT&CK/MSFTAlerts.csv

170 KiB
Исходник Ответственный История

1A logon from a malicious IP has been detected. [seen multiple times]A successful remote authentication for the account [account] and process [process] occurred, however the logon IP address (x.x.x.x) has previously been reported as malicious or highly unusual. A successful attack has probably occurred. Files with the .scr extensions are screen saver files and are normally reside and execute from the Windows system directory.-HighWindowsAzure Defender
2A logon from a malicious IP has been detected(VM_ThreatIntelSuspectLogon)A successful remote authentication for the account [account] and process [process] occurred, however the logon IP address (x.x.x.x) has previously been reported as malicious or highly unusual. A successful attack has probably occurred.Initial accessHighWindowsAzure Defender
3Addition of Guest account to Local Administrators groupAnalysis of host data has detected the addition of the built-in Guest account to the Local Administrators group on %{Compromised Host}, which is strongly associated with attacker activity.-MediumWindowsAzure Defender
4An event log was clearedMachine logs indicate a suspicious event log clearing operation by user: '%{user name}' in Machine: '%{CompromisedEntity}'. The %{log channel} log was cleared.-InformationalWindowsAzure Defender
5Antimalware Action FailedMicrosoft Antimalware has encountered an error when taking an action on malware or other potentially unwanted software.-MediumWindowsAzure Defender
6Antimalware Action TakenMicrosoft Antimalware for Azure has taken an action to protect this machine from malware or other potentially unwanted software.-MediumWindowsAzure Defender
7Antimalware broad files exclusion in your virtual machine(ARM_AmBroadFilesExclusion)Files exclusion from antimalware extension with broad exclusion rule was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription. Such exclusion practically disabling the Antimalware protection.Attackers might exclude files from the antimalware scan on your virtual machine to prevent detection while running arbitrary code or infecting the machine with malware.-MediumWindowsAzure Defender
8Antimalware disabled and code execution in your virtual machine(ARM_AmDisablementAndCodeExecution)Antimalware disabled at the same time as code execution on your virtual machine. This was detected by analyzing Azure Resource Manager operations in your subscription.Attackers disable antimalware scanners to prevent detection while running unauthorized tools or infecting the machine with malware.-HighWindowsAzure Defender
9Antimalware disabled in your virtual machine(ARM_AmDisablement)Antimalware disabled in your virtual machine. This was detected by analyzing Azure Resource Manager operations in your subscription.Attackersmightdisablethe antimalwareonyour virtual machinetopreventdetection.Defense EvasionMediumWindowsAzure Defender
10Antimalware file exclusion and code execution in your virtual machine(ARM_AmFileExclusionAndCodeExecution)File excluded from your antimalware scanner at the same time as code was executed via a custom script extension on your virtual machine. This was detected by analyzing Azure Resource Manager operations in your subscription.Attackers might exclude files from the antimalware scan on your virtual machine to prevent detection while running unauthorized tools or infecting the machine with malware.Defense Evasion, ExecutionHighWindowsAzure Defender
11Antimalware file exclusion and code execution in your virtual machine(ARM_AmTempFileExclusionAndCodeExecution)Temporary file exclusion from antimalware extension in parallel to execution of code via custom script extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers might exclude files from the antimalware scan on your virtual machine to prevent detection while running arbitrary code or infecting the machine with malware.Defense Evasion, ExecutionHighWindowsAzure Defender
12Antimalware file exclusion in your virtual machine(ARM_AmTempFileExclusion)File excluded from your antimalware scanner on your virtual machine. This was detected by analyzing Azure Resource Manager operations in your subscription.Attackers might exclude files from the antimalware scan on your virtual machine to prevent detection while running unauthorized tools or infecting the machine with malware.Defense EvasionMediumWindowsAzure Defender
13Antimalware real-time protection was disabled in your virtual machine(ARM_AmRealtimeProtectionDisabled)Real-time protection disablement of the antimalware extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers might disable real-time protection from the antimalware scan on your virtual machine to avoid detection while running arbitrary code or infecting the machine with malware.Defense EvasionMediumWindowsAzure Defender
14Antimalware real-time protection was disabled temporarily in your virtual machine(ARM_AmTempRealtimeProtectionDisablement)Real-time protection temporary disablement of the antimalware extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers might disable real-time protection from the antimalware scan on your virtual machine to avoid detection while running arbitrary code or infecting the machine with malware.Defense EvasionMediumWindowsAzure Defender
15Antimalware real-time protection was disabled temporarily while code was executed in your virtual machine(ARM_AmRealtimeProtectionDisablementAndCodeExec)Real-time protection temporary disablement of the antimalware extension in parallel to code execution via custom script extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers might disable real-time protection from the antimalware scan on your virtual machine to avoid detection while running arbitrary code or infecting the machine with malware.-HighWindowsAzure Defender
16Antimalware scans blocked for files potentially related to malware campaigns on your virtual machine (Preview)(ARM_AmMalwareCampaignRelatedExclusion)An exclusion rule was detected in your virtual machine to prevent your antimalware extension scanning certain files that are suspected of being related to a malware campaign. The rule was detected by analyzing the Azure Resource Manager operations in your subscription. Attackers might exclude files from antimalware scans to prevent detection while running arbitrary code or infecting the machine with malware.Defense EvasionMediumWindowsAzure Defender
17Antimalware temporarily disabled in your virtual machine(ARM_AmTemporarilyDisablement)Antimalware temporarily disabled in your virtual machine. This was detected by analyzing Azure Resource Manager operations in your subscription.Attackersmightdisablethe antimalwareonyour virtual machinetopreventdetection.-MediumWindowsAzure Defender
18Antimalware unusual file exclusion in your virtual machine(ARM_UnusualAmFileExclusion)Unusual file exclusion from antimalware extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers might exclude files from the antimalware scan on your virtual machine to prevent detection while running arbitrary code or infecting the machine with malware.Defense EvasionMediumWindowsAzure Defender
19Custom script extension with suspicious command in your virtual machine(ARM_CustomScriptExtensionSuspiciousCmd)Custom script extension with suspicious command was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers may use custom script extension to execute a malicious code on your virtual machine via the Azure Resource Manager.ExecutionMediumWindowsAzure Defender
20Custom script extension with suspicious entry-point in your virtual machine(ARM_CustomScriptExtensionSuspiciousEntryPoint)Custom script extension with a suspicious entry-point was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription. The entry-point refers to a suspicious GitHub repository.Attackers may use custom script extensions to execute malicious code on your virtual machines via the Azure Resource Manager.ExecutionMediumWindowsAzure Defender
21Custom script extension with suspicious payload in your virtual machine(ARM_CustomScriptExtensionSuspiciousPayload)Custom script extension with a payload from a suspicious GitHub repository was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers may use custom script extensions to execute malicious code on your virtual machines via the Azure Resource Manager.ExecutionMediumWindowsAzure Defender
22Detected actions indicative of disabling and deleting IIS log filesAnalysis of host data detected actions that show IIS log files being disabled and/or deleted.-MediumWindowsAzure Defender
23Detected anomalous mix of upper and lower case characters in command-lineAnalysis of host data on %{Compromised Host} detected a command line with anomalous mix of upper and lower case characters. This kind of pattern, while possibly benign, is also typical of attackers trying to hide from case-sensitive or hash-based rule matching when performing administrative tasks on a compromised host.-MediumWindowsAzure Defender
24Detected change to a registry key that can be abused to bypass UACAnalysis of host data on %{Compromised Host} detected that a registry key that can be abused to bypass UAC (User Account Control) was changed. This kind of configuration, while possibly benign, is also typical of attacker activity when trying to move from unprivileged (standard user) to privileged (for example administrator) access on a compromised host.-MediumWindowsAzure Defender
25Detected decoding of an executable using built-in certutil.exe toolAnalysis of host data on %{Compromised Host} detected that certutil.exe, a built-in administrator utility, was being used to decode an executable instead of its mainstream purpose that relates to manipulating certificates and certificate data. Attackers are known to abuse functionality of legitimate administrator tools to perform malicious actions, for example using a tool such as certutil.exe to decode a malicious executable that will then be subsequently executed.-HighWindowsAzure Defender
26Detected enabling of the WDigest UseLogonCredential registry keyAnalysis of host data detected a change in the registry key HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest\ "UseLogonCredential". Specifically this key has been updated to allow logon credentials to be stored in clear text in LSA memory. Once enabled an attacker can dump clear text passwords from LSA memory with credential harvesting tools such as Mimikatz.-MediumWindowsAzure Defender
27Detected encoded executable in command line dataAnalysis of host data on %{Compromised Host} detected a base-64 encoded executable. This has previously been associated with attackers attempting to construct executables on-the-fly through a sequence of commands, and attempting to evade intrusion detection systems by ensuring that no individual command would trigger an alert. This could be legitimate activity, or an indication of a compromised host.-HighWindowsAzure Defender
28Detected obfuscated command lineAttackers use increasingly complex obfuscation techniques to evade detections that run against the underlying data. Analysis of host data on %{Compromised Host} detected suspicious indicators of obfuscation on the commandline.-InformationalWindowsAzure Defender
29Detected Petya ransomware indicatorsAnalysis of host data on %{Compromised Host} detected indicators associated with Petya ransomware. See https://blogs.technet.microsoft.com/mmpc/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/ for more information. Review the command line associated in this alert and escalate this alert to your security team.-HighWindowsAzure Defender
30Detected possible execution of keygen executableAnalysis of host data on %{Compromised Host} detected execution of a process whose name is indicative of a keygen tool; such tools are typically used to defeat software licensing mechanisms but their download is often bundled with other malicious software. Activity group GOLD has been known to make use of such keygens to covertly gain back door access to hosts that they compromise.-MediumWindowsAzure Defender
31Detected possible execution of malware dropperAnalysis of host data on %{Compromised Host} detected a filename that has previously been associated with one of activity group GOLD's methods of installing malware on a victim host.-HighWindowsAzure Defender
32Detected potentially suspicious use of Telegram toolAnalysis of host data shows installation of Telegram, a free cloud-based instant messaging service that exists both for mobile and desktop system. Attackers are known to abuse this service to transfer malicious binaries to any other computer, phone, or tablet.-MediumWindowsAzure Defender
33Detected suppression of legal notice displayed to users at logonAnalysis of host data on %{Compromised Host} detected changes to the registry key that controls whether a legal notice is displayed to users when they log on. Microsoft security analysis has determined that this is a common activity undertaken by attackers after having compromised a host.-LowWindowsAzure Defender
34Detected suspicious combination of HTA and PowerShellmshta.exe (Microsoft HTML Application Host) which is a signed Microsoft binary is being used by the attackers to launch malicious PowerShell commands. Attackers often resort to having an HTA file with inline VBScript. When a victim browses to the HTA file and chooses to run it, the PowerShell commands and scripts that it contains are executed. Analysis of host data on %{Compromised Host} detected mshta.exe launching PowerShell commands.-MediumWindowsAzure Defender
35Detected suspicious commandline argumentsAnalysis of host data on %{Compromised Host} detected suspicious commandline arguments that have been used in conjunction with a reverse shell used by activity group HYDROGEN.-HighWindowsAzure Defender
36Detected suspicious commandline used to start all executables in a directoryAnalysis of host data has detected a suspicious process running on %{Compromised Host}. The commandline indicates an attempt to start all executables (*.exe) that may reside in a directory. This could be an indication of a compromised host.-MediumWindowsAzure Defender
37Detected suspicious credentials in commandlineAnalysis of host data on %{Compromised Host} detected a suspicious password being used to execute a file by activity group BORON. This activity group has been known to use this password to execute Pirpi malware on a victim host.-HighWindowsAzure Defender
38Detected suspicious document credentialsAnalysis of host data on %{Compromised Host} detected a suspicious, common precomputed password hash used by malware being used to execute a file. Activity group HYDROGEN has been known to use this password to execute malware on a victim host.-HighWindowsAzure Defender
39Detected suspicious execution of VBScript.Encode commandAnalysis of host data on %{Compromised Host} detected the execution of VBScript.Encode command. This encodes the scripts into unreadable text, making it more difficult for users to examine the code. Microsoft threat research shows that attackers often use encoded VBscript files as part of their attack to evade detection systems. This could be legitimate activity, or an indication of a compromised host.-MediumWindowsAzure Defender
40Detected suspicious execution via rundll32.exeAnalysis of host data on %{Compromised Host} detected rundll32.exe being used to execute a process with an uncommon name, consistent with the process naming scheme previously seen used by activity group GOLD when installing their first stage implant on a compromised host.-HighWindowsAzure Defender
41Detected suspicious file cleanup commandsAnalysis of host data on %{Compromised Host} detected a combination of systeminfo commands that has previously been associated with one of activity group GOLD's methods of performing post-compromise self-cleanup activity. While 'systeminfo.exe' is a legitimate Windows tool, executing it twice in succession, followed by a delete command in the way that has occurred here is rare.-HighWindowsAzure Defender
42Detected suspicious file creationAnalysis of host data on %{Compromised Host} detected creation or execution of a process which has previously indicated post-compromise action taken on a victim host by activity group BARIUM. This activity group has been known to use this technique to download additional malware to a compromised host after an attachment in a phishing doc has been opened.-HighWindowsAzure Defender
43Detected suspicious named pipe communicationsAnalysis of host data on %{Compromised Host} detected data being written to a local named pipe from a Windows console command. Named pipes are known to be a channel used by attackers to task and communicate with a malicious implant. This could be legitimate activity, or an indication of a compromised host.-HighWindowsAzure Defender
44Detected suspicious network activityAnalysis of network traffic from %{Compromised Host} detected suspicious network activity. Such traffic, while possibly benign, is typically used by an attacker to communicate with malicious servers for downloading of tools, command-and-control and exfiltration of data. Typical related attacker activity includes copying remote administration tools to a compromised host and exfiltrating user data from it.-LowWindowsAzure Defender
45Detected suspicious new firewall ruleAnalysis of host data detected a new firewall rule has been added via netsh.exe to allow traffic from an executable in a suspicious location.-MediumWindowsAzure Defender
46Detected suspicious use of Cacls to lower the security state of the systemAttackers use myriad ways like brute force, spear phishing etc. to achieve initial compromise and get a foothold on the network. Once initial compromise is achieved they often take steps to lower the security settings of a system. Cacls—short for change access control list is Microsoft Windows native command-line utility often used for modifying the security permission on folders and files. A lot of time the binary is used by the attackers to lower the security settings of a system. This is done by giving Everyone full access to some of the system binaries like ftp.exe, net.exe, wscript.exe etc. Analysis of host data on %{Compromised Host} detected suspicious use of Cacls to lower the security of a system.-MediumWindowsAzure Defender
47Detected suspicious use of FTP -s SwitchAnalysis of process creation data from the %{Compromised Host} detected the use of the FTP "-s:filename" switch. This switch is used to specify an FTP script file for the client to run. Malware or malicious processes are known to use this FTP switch (-s:filename) to point to a script file which is configured to connect to a remote FTP server and download additional malicious binaries.-MediumWindowsAzure Defender
48Detected suspicious use of Pcalua.exe to launch executable codeAnalysis of host data on %{Compromised Host} detected the use of pcalua.exe to launch executable code. Pcalua.exe is component of the Microsoft Windows "Program Compatibility Assistant" which detects compatibility issues during the installation or execution of a program. Attackers are known to abuse functionality of legitimate Windows system tools to perform malicious actions, for example using pcalua.exe with the -a switch to launch malicious executables either locally or from remote shares.-MediumWindowsAzure Defender
49Detected the disabling of critical servicesThe analysis of host data on %{Compromised Host} detected execution of "net.exe stop" command being used to stop critical services like SharedAccess or Windows Security Center. The stopping of either of these services can be indication of a malicious behavior.-MediumWindowsAzure Defender
50Digital currency mining related behavior detectedAnalysis of host data on %{Compromised Host} detected the execution of a process or command normally associated with digital currency mining.-HighWindowsAzure Defender
51Dynamic PS script constructionAnalysis of host data on %{Compromised Host} detected a PowerShell script being constructed dynamically. Attackers sometimes use this approach of progressively building up a script in order to evade IDS systems. This could be legitimate activity, or an indication that one of your machines has been compromised.-MediumWindowsAzure Defender
52Executable found running from a suspicious locationAnalysis of host data detected an executable file on %{Compromised Host} that is running from a location in common with known suspicious files. This executable could either be legitimate activity, or an indication of a compromised host.-HighWindowsAzure Defender
53Fileless attack behavior detected(VM_FilelessAttackBehavior.Windows)The memory of the process specified contains behaviors commonly used by fileless attacks. Specific behaviors include:1) Shellcode, which is a small piece of code typically used as the payload in the exploitation of a software vulnerability.2) Active network connections. See NetworkConnections below for details.3) Function calls to security sensitive operating system interfaces. See Capabilities below for referenced OS capabilities.4) Contains a thread that was started in a dynamically allocated code segment. This is a common pattern for process injection attacks.Defense EvasionLowWindowsAzure Defender
54Fileless attack technique detected(VM_FilelessAttackTechnique.Windows)The memory of the process specified below contains evidence of a fileless attack technique. Fileless attacks are used by attackers to execute code while evading detection by security software. Specific behaviors include:1) Shellcode, which is a small piece of code typically used as the payload in the exploitation of a software vulnerability.2) Executable image injected into the process, such as in a code injection attack.3) Active network connections. See NetworkConnections below for details.4) Function calls to security sensitive operating system interfaces. See Capabilities below for referenced OS capabilities.5) Process hollowing, which is a technique used by malware in which a legitimate process is loaded on the system to act as a container for hostile code.6) Contains a thread that was started in a dynamically allocated code segment. This is a common pattern for process injection attacks.Defense Evasion, ExecutionHighWindowsAzure Defender
55Fileless attack toolkit detected(VM_FilelessAttackToolkit.Windows)The memory of the process specified contains a fileless attack toolkit: [toolkit name]. Fileless attack toolkits use techniques that minimize or eliminate traces of malware on disk, and greatly reduce the chances of detection by disk-based malware scanning solutions. Specific behaviors include:1) Well-known toolkits and crypto mining software.2) Shellcode, which is a small piece of code typically used as the payload in the exploitation of a software vulnerability.3) Injected malicious executable in process memory.Defense Evasion, ExecutionMediumWindowsAzure Defender
56High risk software detectedAnalysis of host data from %{Compromised Host} detected the usage of software that has been associated with the installation of malware in the past. A common technique utilized in the distribution of malicious software is to package it within otherwise benign tools such as the one seen in this alert. Upon using these tools, the malware can be silently installed in the background.-MediumWindowsAzure Defender
57Local Administrators group members were enumeratedMachine logs indicate a successful enumeration on group %{Enumerated Group Domain Name}%{Enumerated Group Name}. Specifically, %{Enumerating User Domain Name}%{Enumerating User Name} remotely enumerated the members of the %{Enumerated Group Domain Name}%{Enumerated Group Name} group. This activity could either be legitimate activity, or an indication that a machine in your organization has been compromised and used to reconnaissance %{vmname}.-InformationalWindowsAzure Defender
58Malicious firewall rule created by ZINC server implant [seen multiple times]A firewall rule was created using techniques that match a known actor, ZINC. The rule was possibly used to open a port on %{Compromised Host} to allow for Command & Control communications. This behavior was seen [x] times today on the following machines: [Machine names]-HighWindowsAzure Defender
59Malicious SQL activityMachine logs indicate that '%{process name}' was executed by account: %{user name}. This activity is considered malicious.-HighWindowsAzure Defender
60Multiple Domain Accounts QueriedAnalysis of host data has determined that an unusual number of distinct domain accounts are being queried within a short time period from %{Compromised Host}. This kind of activity could be legitimate, but can also be an indication of compromise.-MediumWindowsAzure Defender
61Possible credential dumping detected [seen multiple times]Analysis of host data has detected use of native windows tool (e.g. sqldumper.exe) being used in a way that allows to extract credentials from memory. Attackers often use these techniques to extract credentials that they then further use for lateral movement and privilege escalation. This behavior was seen [x] times today on the following machines: [Machine names]-MediumWindowsAzure Defender
62Potential attempt to bypass AppLocker detectedAnalysis of host data on %{Compromised Host} detected a potential attempt to bypass AppLocker restrictions. AppLocker can be configured to implement a policy that limits what executables are allowed to run on a Windows system. The command-line pattern similar to that identified in this alert has been previously associated with attacker attempts to circumvent AppLocker policy by using trusted executables (allowed by AppLocker policy) to execute untrusted code. This could be legitimate activity, or an indication of a compromised host.-HighWindowsAzure Defender
63PsExec execution detected(VM_RunByPsExec)Analysis of host data indicates that the process %{Process Name} was executed by PsExec utility. PsExec can be used for running processes remotely. This technique might be used for malicious purposes.Lateral Movement, ExecutionInformationalWindowsAzure Defender
64Ransomware indicators detected [seen multiple times]Analysis of host data indicates suspicious activity traditionally associated with lock-screen and encryption ransomware. Lock screen ransomware displays a full-screen message preventing interactive use of the host and access to its files. Encryption ransomware prevents access by encrypting data files. In both cases a ransom message is typically displayed, requesting payment in order to restore file access. This behavior was seen [x] times today on the following machines: [Machine names]-HighWindowsAzure Defender
65Ransomware indicators detectedAnalysis of host data indicates suspicious activity traditionally associated with lock-screen and encryption ransomware. Lock screen ransomware displays a full-screen message preventing interactive use of the host and access to its files. Encryption ransomware prevents access by encrypting data files. In both cases a ransom message is typically displayed, requesting payment in order to restore file access.-HighWindowsAzure Defender
66Rare SVCHOST service group executed(VM_SvcHostRunInRareServiceGroup)The system process SVCHOST was observed running a rare service group. Malware often uses SVCHOST to masquerade its malicious activity.Defense Evasion, ExecutionInformationalWindowsAzure Defender
67Sticky keys attack detectedAnalysis of host data indicates that an attacker may be subverting an accessibility binary (for example sticky keys, onscreen keyboard, narrator) in order to provide backdoor access to the host %{Compromised Host}.-MediumWindowsAzure Defender
68Successful brute force attack(VM_LoginBruteForceSuccess)Several sign in attempts were detected from the same source. Some successfully authenticated to the host.This resembles a burst attack, in which an attacker performs numerous authentication attempts to find valid account credentials.ExploitationMedium/HighWindowsAzure Defender
69Suspect integrity level indicative of RDP hijackingAnalysis of host data has detected the tscon.exe running with SYSTEM privileges - this can be indicative of an attacker abusing this binary in order to switch context to any other logged on user on this host; it is a known attacker technique to compromise additional user accounts and move laterally across a network.-MediumWindowsAzure Defender
70Suspect service installationAnalysis of host data has detected the installation of tscon.exe as a service: this binary being started as a service potentially allows an attacker to trivially switch to any other logged on user on this host by hijacking RDP connections; it is a known attacker technique to compromise additional user accounts and move laterally across a network.-MediumWindowsAzure Defender
71Suspected Kerberos Golden Ticket attack parameters observedAnalysis of host data detected commandline parameters consistent with a Kerberos Golden Ticket attack.-MediumWindowsAzure Defender
72Suspicious Account Creation DetectedAnalysis of host data on %{Compromised Host} detected creation or use of a local account %{Suspicious account name} : this account name closely resembles a standard Windows account or group name '%{Similar To Account Name}'. This is potentially a rogue account created by an attacker, so named in order to avoid being noticed by a human administrator.-MediumWindowsAzure Defender
73Suspicious Activity Detected(VM_SuspiciousActivity)Analysis of host data has detected a sequence of one or more processes running on %{machine name} that have historically been associated with malicious activity. While individual commands may appear benign the alert is scored based on an aggregation of these commands. This could either be legitimate activity, or an indication of a compromised host.ExecutionMediumWindowsAzure Defender
74Suspicious authentication activity(VM_LoginBruteForceValidUserFailed)Although none of them succeeded, some of them used accounts were recognized by the host. This resembles a dictionary attack, in which an attacker performs numerous authentication attempts using a dictionary of predefined account names and passwords in order to find valid credentials to access the host. This indicates that some of your host account names might exist in a well-known account name dictionary.ProbingMediumWindowsAzure Defender
75Suspicious code segment detectedIndicates that a code segment has been allocated by using non-standard methods, such as reflective injection and process hollowing. The alert provides additional characteristics of the code segment that have been processed to provide context for the capabilities and behaviors of the reported code segment.-MediumWindowsAzure Defender
76Suspicious command execution(VM_SuspiciousCommandLineExecution)Machine logs indicate a suspicious command-line execution by user %{user name}.ExecutionHighWindowsAzure Defender
77Suspicious double extension file executedAnalysis of host data indicates an execution of a process with a suspicious double extension. This extension may trick users into thinking files are safe to be opened and might indicate the presence of malware on the system.-HighWindowsAzure Defender
78Suspicious download using Certutil detected [seen multiple times]Analysis of host data on %{Compromised Host} detected the use of certutil.exe, a built-in administrator utility, for the download of a binary instead of its mainstream purpose that relates to manipulating certificates and certificate data. Attackers are known to abuse functionality of legitimate administrator tools to perform malicious actions, for example using certutil.exe to download and decode a malicious executable that will then be subsequently executed. This behavior was seen [x] times today on the following machines: [Machine names]-MediumWindowsAzure Defender
79Suspicious download using Certutil detectedAnalysis of host data on %{Compromised Host} detected the use of certutil.exe, a built-in administrator utility, for the download of a binary instead of its mainstream purpose that relates to manipulating certificates and certificate data. Attackers are known to abuse functionality of legitimate administrator tools to perform malicious actions, for example using certutil.exe to download and decode a malicious executable that will then be subsequently executed.-MediumWindowsAzure Defender
80Suspicious failed execution of custom script extension in your virtual machine(ARM_CustomScriptExtensionSuspiciousFailure)Suspicious failure of a custom script extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Such failures may be associated with malicious scripts run by this extension.ExecutionMediumWindowsAzure Defender
81Suspicious PowerShell Activity DetectedAnalysis of host data detected a PowerShell script running on %{Compromised Host} that has features in common with known suspicious scripts. This script could either be legitimate activity, or an indication of a compromised host.-HighWindowsAzure Defender
82Suspicious PowerShell cmdlets executedAnalysis of host data indicates execution of known malicious PowerShell PowerSploit cmdlets.-MediumWindowsAzure Defender
83Suspicious process executed [seen multiple times]Machine logs indicate that the suspicious process: '%{Suspicious Process}' was running on the machine, often associated with attacker attempts to access credentials. This behavior was seen [x] times today on the following machines: [Machine names]-HighWindowsAzure Defender
84Suspicious process executedMachine logs indicate that the suspicious process: '%{Suspicious Process}' was running on the machine, often associated with attacker attempts to access credentials.-HighWindowsAzure Defender
85Suspicious process name detected [seen multiple times]Analysis of host data on %{Compromised Host} detected a process whose name is suspicious, for example corresponding to a known attacker tool or named in a way that is suggestive of attacker tools that try to hide in plain sight. This process could be legitimate activity, or an indication that one of your machines has been compromised. This behavior was seen [x] times today on the following machines: [Machine names]-MediumWindowsAzure Defender
86Suspicious process name detectedAnalysis of host data on %{Compromised Host} detected a process whose name is suspicious, for example corresponding to a known attacker tool or named in a way that is suggestive of attacker tools that try to hide in plain sight. This process could be legitimate activity, or an indication that one of your machines has been compromised.-MediumWindowsAzure Defender
87Suspicious process termination burst(VM_TaskkillBurst)Analysis of host data indicates a suspicious process termination burst in %{Machine Name}. Specifically, %{NumberOfCommands} processes were killed between %{Begin} and %{Ending}.Defense EvasionLowWindowsAzure Defender
88Suspicious Screensaver process executed(VM_SuspiciousScreenSaverExecution)The process '%{process name}' was observed executing from an uncommon location. Files with the .scr extensions are screen saver files and are normally reside and execute from the Windows system directory.Defense Evasion, ExecutionMediumWindowsAzure Defender
89Suspicious SQL activityMachine logs indicate that '%{process name}' was executed by account: %{user name}. This activity is uncommon with this account.-MediumWindowsAzure Defender
90Suspicious SVCHOST process executedThe system process SVCHOST was observed running in an abnormal context. Malware often uses SVCHOST to masquerade its malicious activity.-HighWindowsAzure Defender
91Suspicious system process executed(VM_SystemProcessInAbnormalContext)The system process %{process name} was observed running in an abnormal context. Malware often uses this process name to masquerade its malicious activity.Defense Evasion, ExecutionHighWindowsAzure Defender
92Suspicious Volume Shadow Copy ActivityAnalysis of host data has detected a shadow copy deletion activity on the resource. Volume Shadow Copy (VSC) is an important artifact that stores data snapshots. Some malware and specifically Ransomware, targets VSC to sabotage backup strategies.-HighWindowsAzure Defender
93Suspicious WindowPosition registry value detectedAnalysis of host data on %{Compromised Host} detected an attempted WindowPosition registry configuration change that could be indicative of hiding application windows in non-visible sections of the desktop. This could be legitimate activity, or an indication of a compromised machine: this type of activity has been previously associated with known adware (or unwanted software) such as Win32/OneSystemCare and Win32/SystemHealer and malware such as Win32/Creprote. When the WindowPosition value is set to 201329664, (Hex: 0x0c00 0c00, corresponding to X-axis=0c00 and the Y-axis=0c00) this places the console app's window in a non-visible section of the user's screen in an area that is hidden from view below the visible start menu/taskbar. Known suspect Hex value includes, but not limited to c000c000-LowWindowsAzure Defender
94Suspiciously named process detectedAnalysis of host data on %{Compromised Host} detected a process whose name is very similar to but different from a very commonly run process (%{Similar To Process Name}). While this process could be benign attackers are known to sometimes hide in plain sight by naming their malicious tools to resemble legitimate process names.-MediumWindowsAzure Defender
95Unusual config reset in your virtual machine(ARM_VMAccessUnusualConfigReset)An unusual config reset was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.While this action may be legitimate, attackers can try utilizing VM Access extension to reset the configuration in your virtual machine and compromise it.Credential AccessMediumWindowsAzure Defender
96Unusual deletion of custom script extension in your virtual machine(ARM_CustomScriptExtensionUnusualDeletion)Unusual deletion of a custom script extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers may use custom script extensions to execute malicious code on your virtual machines via the Azure Resource Manager.ExecutionMediumWindowsAzure Defender
97Unusual execution of custom script extension in your virtual machine(ARM_CustomScriptExtensionUnusualExecution)Unusual execution of a custom script extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers may use custom script extensions to execute malicious code on your virtual machines via the Azure Resource Manager.ExecutionMediumWindowsAzure Defender
98Unusual process execution detectedAnalysis of host data on %{Compromised Host} detected the execution of a process by %{User Name} that was unusual. Accounts such as %{User Name} tend to perform a limited set of operations, this execution was determined to be out of character and may be suspicious.-HighWindowsAzure Defender
99Unusual user password reset in your virtual machine(ARM_VMAccessUnusualPasswordReset)An unusual user password reset was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.While this action may be legitimate, attackers can try utilizing the VM Access extension to reset the credentials of a local user in your virtual machine and compromise it.Credential AccessMediumWindowsAzure Defender
100Unusual user SSH key reset in your virtual machine(ARM_VMAccessUnusualSSHReset)An unusual user SSH key reset was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.While this action may be legitimate, attackers can try utilizing VM Access extension to reset SSH key of a user account in your virtual machine and compromise it.Credential AccessMediumWindowsAzure Defender
101VBScript HTTP object allocation detectedCreation of a VBScript file using Command Prompt has been detected. The following script contains HTTP object allocation command. This action can be used to download malicious files.-HighWindowsAzure Defender
102Windows registry persistence method detected(VM_RegistryPersistencyKey)Analysis of host data has detected an attempt to persist an executable in the Windows registry. Malware often uses such a technique to survive a boot.PersistenceLowWindowsAzure Defender
103Access of htaccess file detected(VM_SuspectHtaccessFileAccess)Analysis of host data on %{Compromised Host} detected possible manipulation of a htaccess file. Htaccess is a powerful configuration file that allows you to make multiple changes to a web server running the Apache Web software including basic redirect functionality, or for more advanced functions such as basic password protection. Attackers will often modify htaccess files on machines they have compromised to gain persistence.Persistence, Defense Evasion, ExecutionMediumLinuxAzure Defender
104An history file has been clearedAnalysis of host data indicates that the command history log file has been cleared. Attackers may do this to cover their traces. The operation was performed by user: '%{user name}'.-MediumLinuxAzure Defender
105Antimalware broad files exclusion in your virtual machine(ARM_AmBroadFilesExclusion)Files exclusion from antimalware extension with broad exclusion rule was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription. Such exclusion practically disabling the Antimalware protection.Attackers might exclude files from the antimalware scan on your virtual machine to prevent detection while running arbitrary code or infecting the machine with malware.-MediumLinuxAzure Defender
106Antimalware disabled and code execution in your virtual machine(ARM_AmDisablementAndCodeExecution)Antimalware disabled at the same time as code execution on your virtual machine. This was detected by analyzing Azure Resource Manager operations in your subscription.Attackers disable antimalware scanners to prevent detection while running unauthorized tools or infecting the machine with malware.-HighLinuxAzure Defender
107Antimalware disabled in your virtual machine(ARM_AmDisablement)Antimalware disabled in your virtual machine. This was detected by analyzing Azure Resource Manager operations in your subscription.Attackersmightdisablethe antimalwareonyour virtual machinetopreventdetection.Defense EvasionMediumLinuxAzure Defender
108Antimalware file exclusion and code execution in your virtual machine(ARM_AmFileExclusionAndCodeExecution)File excluded from your antimalware scanner at the same time as code was executed via a custom script extension on your virtual machine. This was detected by analyzing Azure Resource Manager operations in your subscription.Attackers might exclude files from the antimalware scan on your virtual machine to prevent detection while running unauthorized tools or infecting the machine with malware.Defense Evasion, ExecutionHighLinuxAzure Defender
109Antimalware file exclusion and code execution in your virtual machine(ARM_AmTempFileExclusionAndCodeExecution)Temporary file exclusion from antimalware extension in parallel to execution of code via custom script extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers might exclude files from the antimalware scan on your virtual machine to prevent detection while running arbitrary code or infecting the machine with malware.Defense Evasion, ExecutionHighLinuxAzure Defender
110Antimalware file exclusion in your virtual machine(ARM_AmTempFileExclusion)File excluded from your antimalware scanner on your virtual machine. This was detected by analyzing Azure Resource Manager operations in your subscription.Attackers might exclude files from the antimalware scan on your virtual machine to prevent detection while running unauthorized tools or infecting the machine with malware.Defense EvasionMediumLinuxAzure Defender
111Antimalware real-time protection was disabled in your virtual machine(ARM_AmRealtimeProtectionDisabled)Real-time protection disablement of the antimalware extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers might disable real-time protection from the antimalware scan on your virtual machine to avoid detection while running arbitrary code or infecting the machine with malware.Defense EvasionMediumLinuxAzure Defender
112Antimalware real-time protection was disabled temporarily in your virtual machine(ARM_AmTempRealtimeProtectionDisablement)Real-time protection temporary disablement of the antimalware extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers might disable real-time protection from the antimalware scan on your virtual machine to avoid detection while running arbitrary code or infecting the machine with malware.Defense EvasionMediumLinuxAzure Defender
113Antimalware real-time protection was disabled temporarily while code was executed in your virtual machine(ARM_AmRealtimeProtectionDisablementAndCodeExec)Real-time protection temporary disablement of the antimalware extension in parallel to code execution via custom script extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers might disable real-time protection from the antimalware scan on your virtual machine to avoid detection while running arbitrary code or infecting the machine with malware.-HighLinuxAzure Defender
114Antimalware scans blocked for files potentially related to malware campaigns on your virtual machine (Preview)(ARM_AmMalwareCampaignRelatedExclusion)An exclusion rule was detected in your virtual machine to prevent your antimalware extension scanning certain files that are suspected of being related to a malware campaign. The rule was detected by analyzing the Azure Resource Manager operations in your subscription. Attackers might exclude files from antimalware scans to prevent detection while running arbitrary code or infecting the machine with malware.Defense EvasionMediumLinuxAzure Defender
115Antimalware temporarily disabled in your virtual machine(ARM_AmTemporarilyDisablement)Antimalware temporarily disabled in your virtual machine. This was detected by analyzing Azure Resource Manager operations in your subscription.Attackersmightdisablethe antimalwareonyour virtual machinetopreventdetection.-MediumLinuxAzure Defender
116Antimalware unusual file exclusion in your virtual machine(ARM_UnusualAmFileExclusion)Unusual file exclusion from antimalware extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers might exclude files from the antimalware scan on your virtual machine to prevent detection while running arbitrary code or infecting the machine with malware.Defense EvasionMediumLinuxAzure Defender
117Attempt to stop apt-daily-upgrade.timer service detected [seen multiple times]Analysis of host data on %{Compromised Host} detected an attempt to stop apt-daily-upgrade.timer service. In some recent attacks, attackers have been observed stopping this service, to download malicious files and granting execution privileges for their attack. This behavior was seen [x] times today on the following machines: [Machine names]-LowLinuxAzure Defender
118Attempt to stop apt-daily-upgrade.timer service detected(VM_TimerServiceDisabled)Analysis of host data on %{Compromised Host} detected an attempt to stop apt-daily-upgrade.timer service. In some recent attacks, attackers have been observed stopping this service, to download malicious files and granting execution privileges for their attack.Defense EvasionLowLinuxAzure Defender
119Behavior similar to common Linux bots detected [seen multiple times]Analysis of host data on %{Compromised Host} detected the execution of a process normally associated with common Linux botnets. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
120Behavior similar to common Linux bots detected(VM_CommonBot)Analysis of host data on %{Compromised Host} detected the execution of a process normally associated with common Linux botnets.Execution, Collection, Command and ControlMediumLinuxAzure Defender
121Behavior similar to Fairware ransomware detected [seen multiple times]Analysis of host data on %{Compromised Host} detected the execution of rm -rf commands applied to suspicious locations. As rm -rf will recursively delete files, it is normally used on discrete folders. In this case, it is being used in a location that could remove a lot of data. Fairware ransomware is known to execute rm -rf commands in this folder. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
122Behavior similar to Fairware ransomware detected(VM_FairwareMalware)Analysis of host data on %{Compromised Host} detected the execution of rm -rf commands applied to suspicious locations. As rm -rf will recursively delete files, it is normally used on discrete folders. In this case, it is being used in a location that could remove a lot of data. Fairware ransomware is known to execute rm -rf commands in this folder.ExecutionMediumLinuxAzure Defender
123Behavior similar to ransomware detected [seen multiple times]Analysis of host data on %{Compromised Host} detected the execution of files that have resemblance of known ransomware that can prevent users from accessing their system or personal files, and demands ransom payment in order to regain access. This behavior was seen [x] times today on the following machines: [Machine names]-HighLinuxAzure Defender
124Container with a miner image detectedMachine logs indicate execution of a Docker container that runs an image associated with a digital currency mining. This behavior can possibly indicate that your resources are abused by an attacker.-HighLinuxAzure Defender
125Custom script extension with suspicious command in your virtual machine(ARM_CustomScriptExtensionSuspiciousCmd)Custom script extension with suspicious command was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers may use custom script extension to execute a malicious code on your virtual machine via the Azure Resource Manager.ExecutionMediumLinuxAzure Defender
126Custom script extension with suspicious entry-point in your virtual machine(ARM_CustomScriptExtensionSuspiciousEntryPoint)Custom script extension with a suspicious entry-point was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription. The entry-point refers to a suspicious GitHub repository.Attackers may use custom script extensions to execute malicious code on your virtual machines via the Azure Resource Manager.ExecutionMediumLinuxAzure Defender
127Custom script extension with suspicious payload in your virtual machine(ARM_CustomScriptExtensionSuspiciousPayload)Custom script extension with a payload from a suspicious GitHub repository was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers may use custom script extensions to execute malicious code on your virtual machines via the Azure Resource Manager.ExecutionMediumLinuxAzure Defender
128Detected anomalous mix of upper and lower case characters in command lineAnalysis of host data on %{Compromised Host} detected a command line with anomalous mix of upper and lower case characters. This kind of pattern, while possibly benign, is also typical of attackers trying to hide from case-sensitive or hash-based rule matching when performing administrative tasks on a compromised host.-MediumLinuxAzure Defender
129Detected file download from a known malicious source [seen multiple times](VM_SuspectDownload)Analysis of host data has detected the download of a file from a known malware source on %{Compromised Host}. This behavior was seen over [x] times today on the following machines: [Machine names]Privilege Escalation, Execution, Exfiltration, Command and ControlMediumLinuxAzure Defender
130Detected file download from a known malicious sourceAnalysis of host data has detected the download of a file from a known malware source on %{Compromised Host}.-MediumLinuxAzure Defender
131Detected persistence attempt [seen multiple times]Analysis of host data on %{Compromised Host} has detected installation of a startup script for single-user mode. It is extremely rare that any legitimate process needs to execute in that mode, so this may indicate that an attacker has added a malicious process to every run-level to guarantee persistence. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
132Detected persistence attempt(VM_NewSingleUserModeStartupScript)Host data analysis has detected that a startup script for single-user mode has been installed.Because it's rare that any legitimate process would be required to run in that mode, this might indicate that an attacker has added a malicious process to every run-level to guarantee persistence.PersistenceMediumLinuxAzure Defender
133Detected suspicious file download [seen multiple times]Analysis of host data has detected suspicious download of remote file on %{Compromised Host}. This behavior was seen 10 times today on the following machines: [Machine name]-LowLinuxAzure Defender
134Detected suspicious file download(VM_SuspectDownloadArtifacts)Analysis of host data has detected suspicious download of remote file on %{Compromised Host}.PersistenceLowLinuxAzure Defender
135Detected suspicious network activityAnalysis of network traffic from %{Compromised Host} detected suspicious network activity. Such traffic, while possibly benign, is typically used by an attacker to communicate with malicious servers for downloading of tools, command-and-control and exfiltration of data. Typical related attacker activity includes copying remote administration tools to a compromised host and exfiltrating user data from it.-LowLinuxAzure Defender
136Detected suspicious use of the useradd command [seen multiple times]Analysis of host data has detected suspicious use of the useradd command on %{Compromised Host}. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
137Detected suspicious use of the useradd command(VM_SuspectUserAddition)Analysis of host data has detected suspicious use of the useradd command on %{Compromised Host}.PersistenceMediumLinuxAzure Defender
138Digital currency mining related behavior detectedAnalysis of host data on %{Compromised Host} detected the execution of a process or command normally associated with digital currency mining.-HighLinuxAzure Defender
139Disabling of auditd logging [seen multiple times]The Linux Audit system provides a way to track security-relevant information on the system. It records as much information about the events that are happening on your system as possible. Disabling auditd logging could hamper discovering violations of security policies used on the system. This behavior was seen [x] times today on the following machines: [Machine names]-LowLinuxAzure Defender
140Executable found running from a suspicious location(VM_SuspectExecutablePath)Analysis of host data detected an executable file on %{Compromised Host} that is running from a location in common with known suspicious files. This executable could either be legitimate activity, or an indication of a compromised host.ExecutionHighLinuxAzure Defender
141Exploitation of Xorg vulnerability [seen multiple times]Analysis of host data on %{Compromised Host} detected the user of Xorg with suspicious arguments. Attackers may use this technique in privilege escalation attempts. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
142Exposed Docker daemon on TCP socket(VM_ExposedDocker)Machine logs indicate that your Docker daemon (dockerd) exposes a TCP socket. By default, Docker configuration, does not use encryption or authentication when a TCP socket is enabled. This enables full access to the Docker daemon, by anyone with access to the relevant port.Execution, ExploitationMediumLinuxAzure Defender
143Failed SSH brute force attack(VM_SshBruteForceFailed)Failed brute force attacks were detected from the following attackers: %{Attackers}. Attackers were trying to access the host with the following user names: %{Accounts used on failed sign in to host attempts}.ProbingMediumLinuxAzure Defender
144Fileless Attack Behavior Detected(AppServices_FilelessAttackBehaviorDetection)The memory of the process specified below contains behaviors commonly used by fileless attacks.Specific behaviors include: {list of observed behaviors}ExecutionMediumLinuxAzure Defender
145Fileless Attack Technique Detected(VM_FilelessAttackTechnique.Linux)The memory of the process specified below contains evidence of a fileless attack technique. Fileless attacks are used by attackers to execute code while evading detection by security software.Specific behaviors include: {list of observed behaviors}ExecutionHighLinuxAzure Defender
146Fileless Attack Toolkit Detected(VM_FilelessAttackToolkit.Linux)The memory of the process specified below contains a fileless attack toolkit: {ToolKitName}. Fileless attack toolkits typically do not have a presence on the filesystem, making detection by traditional anti-virus software difficult.Specific behaviors include: {list of observed behaviors}Defense Evasion, ExecutionHighLinuxAzure Defender
147Hidden file execution detectedAnalysis of host data indicates that a hidden file was executed by %{user name}. This activity could either be legitimate activity, or an indication of a compromised host.-InformationalLinuxAzure Defender
148Indicators associated with DDOS toolkit detected [seen multiple times]Analysis of host data on %{Compromised Host} detected file names that are part of a toolkit associated with malware capable of launching DDoS attacks, opening ports and services and taking full control over the infected system. This could also possibly be legitimate activity. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
149Indicators associated with DDOS toolkit detected(VM_KnownLinuxDDoSToolkit)Analysis of host data on %{Compromised Host} detected file names that are part of a toolkit associated with malware capable of launching DDoS attacks, opening ports and services and taking full control over the infected system. This could also possibly be legitimate activity.Persistence, Lateral Movement, Execution, ExploitationMediumLinuxAzure Defender
150Local host reconnaissance detected [seen multiple times]Analysis of host data on %{Compromised Host} detected the execution of a command normally associated with common Linux bot reconnaissance. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
151Local host reconnaissance detected(VM_LinuxReconnaissance)Analysis of host data on %{Compromised Host} detected the execution of a command normally associated with common Linux bot reconnaissance.DiscoveryMediumLinuxAzure Defender
152Manipulation of host firewall detected [seen multiple times](VM_FirewallDisabled)Analysis of host data on %{Compromised Host} detected possible manipulation of the on-host firewall. Attackers will often disable this to exfiltrate data. This behavior was seen [x] times today on the following machines: [Machine names]Defense Evasion, ExfiltrationMediumLinuxAzure Defender
153Manipulation of host firewall detectedAnalysis of host data on %{Compromised Host} detected possible manipulation of the on-host firewall. Attackers will often disable this to exfiltrate data.-MediumLinuxAzure Defender
154MITRE Caldera agent detected(VM_MitreCalderaTools)Machine logs indicate that the suspicious process: '%{Suspicious Process}' was running on %{Compromised Host}. This is often associated with the MITRE 54ndc47 agent which could be used maliciously to attack other machines in some way.AllMediumLinuxAzure Defender
155New SSH key added [seen multiple times](VM_SshKeyAddition)A new SSH key was added to the authorized keys file. This behavior was seen [x] times today on the following machines: [Machine names]PersistenceLowLinuxAzure Defender
156New SSH key addedA new SSH key was added to the authorized keys file-LowLinuxAzure Defender
157Possible attack tool detected [seen multiple times]Machine logs indicate that the suspicious process: '%{Suspicious Process}' was running on %{Compromised Host}. This tool is often associated with malicious users attacking other machines in some way. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
158Possible attack tool detected(VM_KnownLinuxAttackTool)Machine logs indicate that the suspicious process: '%{Suspicious Process}' was running on %{Compromised Host}. This tool is often associated with malicious users attacking other machines in some way.Execution, Collection, Command and Control, ProbingMediumLinuxAzure Defender
159Possible backdoor detected [seen multiple times]Analysis of host data has detected a suspicious file being downloaded then run on %{Compromised Host} in your subscription. This activity has previously been associated with installation of a backdoor. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
160Possible credential access tool detected [seen multiple times]Machine logs indicate a possible known credential access tool was running on %{Compromised Host} launched by process: '%{Suspicious Process}'. This tool is often associated with attacker attempts to access credentials. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
161Possible credential access tool detected(VM_KnownLinuxCredentialAccessTool)Machine logs indicate a possible known credential access tool was running on %{Compromised Host} launched by process: '%{Suspicious Process}'. This tool is often associated with attacker attempts to access credentials.Credential AccessMediumLinuxAzure Defender
162Possible exploitation of Hadoop Yarn(VM_HadoopYarnExploit)Analysis of host data on %{Compromised Host} detected the possible exploitation of the Hadoop Yarn service.ExploitationMediumLinuxAzure Defender
163Possible exploitation of the mailserver detected(VM_MailserverExploitation )Analysis of host data on %{Compromised Host} detected an unusual execution under the mail server accountExploitationMediumLinuxAzure Defender
164Possible Log Tampering Activity Detected [seen multiple times]Analysis of host data on %{Compromised Host} detected possible removal of files that tracks user's activity during the course of its operation. Attackers often try to evade detection and leave no trace of malicious activities by deleting such log files. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
165Possible Log Tampering Activity Detected(VM_SystemLogRemoval)Analysis of host data on %{Compromised Host} detected possible removal of files that tracks user's activity during the course of its operation. Attackers often try to evade detection and leave no trace of malicious activities by deleting such log files.Defense EvasionMediumLinuxAzure Defender
166Possible loss of data detected [seen multiple times]Analysis of host data on %{Compromised Host} detected a possible data egress condition. Attackers will often egress data from machines they have compromised. This behavior was seen [x]] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
167Possible loss of data detected(VM_DataEgressArtifacts)Analysis of host data on %{Compromised Host} detected a possible data egress condition. Attackers will often egress data from machines they have compromised.Collection, ExfiltrationMediumLinuxAzure Defender
168Possible malicious web shell detected [seen multiple times](VM_Webshell)Analysis of host data on %{Compromised Host} detected a possible web shell. Attackers will often upload a web shell to a machine they have compromised to gain persistence or for further exploitation. This behavior was seen [x] times today on the following machines: [Machine names]Persistence, ExploitationMediumLinuxAzure Defender
169Possible malicious web shell detectedAnalysis of host data on %{Compromised Host} detected a possible web shell. Attackers will often upload a web shell to a machine they have compromised to gain persistence or for further exploitation.-MediumLinuxAzure Defender
170Possible password change using crypt-method detected [seen multiple times]Analysis of host data on %{Compromised Host} detected password change using crypt method. Attackers can make this change to continue access and gaining persistence after compromise. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
171Potential overriding of common files [seen multiple times]Analysis of host data has detected common executables being overwritten on %{Compromised Host}. Attackers will overwrite common files as a way to obfuscate their actions or for persistence. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
172Potential overriding of common files(VM_OverridingCommonFiles)Analysis of host data has detected common executables being overwritten on %{Compromised Host}. Attackers will overwrite common files as a way to obfuscate their actions or for persistence.PersistenceMediumLinuxAzure Defender
173Potential port forwarding to external IP address [seen multiple times]Analysis of host data on %{Compromised Host} detected the initiation of port forwarding to an external IP address. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
174Potential port forwarding to external IP address(VM_SuspectPortForwarding)Host data analysis detected the initiation of port forwarding to an external IP address.Exfiltration, Command and ControlMediumLinuxAzure Defender
175Potential reverse shell detected [seen multiple times]Analysis of host data on %{Compromised Host} detected a potential reverse shell. These are used to get a compromised machine to call back into a machine an attacker owns. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
176Potential reverse shell detected(VM_ReverseShell)Analysis of host data on %{Compromised Host} detected a potential reverse shell. These are used to get a compromised machine to call back into a machine an attacker owns.Exfiltration, ExploitationMediumLinuxAzure Defender
177Privileged command run in containerMachine logs indicate that a privileged command was run in a Docker container. A privileged command has extended privileges on the host machine.-LowLinuxAzure Defender
178Privileged Container DetectedMachine logs indicate that a privileged Docker container is running. A privileged container has a full access to the host's resources. If compromised, an attacker can use the privileged container to gain access to the host machine.-LowLinuxAzure Defender
179Process associated with digital currency mining detected [seen multiple times]Analysis of host data on %{Compromised Host} detected the execution of a process normally associated with digital currency mining. This behavior was seen over 100 times today on the following machines: [Machine name]-MediumLinuxAzure Defender
180Process associated with digital currency mining detectedHost data analysis detected the execution of a process that is normally associated with digital currency mining.Exploitation, ExecutionMediumLinuxAzure Defender
181Process seen accessing the SSH authorized keys file in an unusual way(VM_SshKeyAccess)An SSH authorized keys file has been accessed in a method similar to known malware campaigns. This access can indicate that an attacker is attempting to gain persistent access to a machine.-LowLinuxAzure Defender
182Python encoded downloader detected [seen multiple times]Analysis of host data on %{Compromised Host} detected the execution of encoded Python that downloads and runs code from a remote location. This may be an indication of malicious activity. This behavior was seen [x] times today on the following machines: [Machine names]-LowLinuxAzure Defender
183Screenshot taken on host [seen multiple times]Analysis of host data on %{Compromised Host} detected the user of a screen capture tool. Attackers may use these tools to access private data. This behavior was seen [x] times today on the following machines: [Machine names]-LowLinuxAzure Defender
184Script extension mismatch detected [seen multiple times]Analysis of host data on %{Compromised Host} detected a mismatch between the script interpreter and the extension of the script file provided as input. This has frequently been associated with attacker script executions. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
185Script extension mismatch detected(VM_MismatchedScriptFeatures)Analysis of host data on %{Compromised Host} detected a mismatch between the script interpreter and the extension of the script file provided as input. This has frequently been associated with attacker script executions.Defense EvasionMediumLinuxAzure Defender
186Shellcode detected [seen multiple times]Analysis of host data on %{Compromised Host} detected shellcode being generated from the command line. This process could be legitimate activity, or an indication that one of your machines has been compromised. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
187SSH server is running inside a container(VM_ContainerSSH)Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached.ExecutionMediumLinuxAzure Defender
188Successful SSH brute force attack(VM_SshBruteForceSuccess)Analysis of host data has detected a successful brute force attack. The IP %{Attacker source IP} was seen making multiple login attempts. Successful logins were made from that IP with the following user(s): %{Accounts used to successfully sign in to host}. This means that the host may be compromised and controlled by a malicious actor.ExploitationHighLinuxAzure Defender
189Suspicious Account Creation DetectedAnalysis of host data on %{Compromised Host} detected creation or use of a local account %{Suspicious account name} : this account name closely resembles a standard Windows account or group name '%{Similar To Account Name}'. This is potentially a rogue account created by an attacker, so named in order to avoid being noticed by a human administrator.-MediumLinuxAzure Defender
190Suspicious compilation detected [seen multiple times]Analysis of host data on %{Compromised Host} detected suspicious compilation. Attackers will often compile exploits on a machine they have compromised to escalate privileges. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
191Suspicious compilation detected(VM_SuspectCompilation)Analysis of host data on %{Compromised Host} detected suspicious compilation. Attackers will often compile exploits on a machine they have compromised to escalate privileges.Privilege Escalation, ExploitationMediumLinuxAzure Defender
192Suspicious failed execution of custom script extension in your virtual machine(ARM_CustomScriptExtensionSuspiciousFailure)Suspicious failure of a custom script extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Such failures may be associated with malicious scripts run by this extension.ExecutionMediumLinuxAzure Defender
193Suspicious kernel module detected [seen multiple times]Analysis of host data on %{Compromised Host} detected a shared object file being loaded as a kernel module. This could be legitimate activity, or an indication that one of your machines has been compromised. This behavior was seen [x] times today on the following machines: [Machine names]-MediumLinuxAzure Defender
194Suspicious password access [seen multiple times]Analysis of host data has detected suspicious access to encrypted user passwords on %{Compromised Host}. This behavior was seen [x] times today on the following machines: [Machine names]-InformationalLinuxAzure Defender
195Suspicious password accessAnalysis of host data has detected suspicious access to encrypted user passwords on %{Compromised Host}.-InformationalLinuxAzure Defender
196Suspicious PHP execution detected(VM_SuspectPhp)Machine logs indicate that a suspicious PHP process is running. The action included an attempt to run OS commands or PHP code from the command line using the PHP process. While this behavior can be legitimate, in web applications this behavior is also observed in malicious activities such as attempts to infect websites with web shells.ExecutionMediumLinuxAzure Defender
197Suspicious request to Kubernetes API(VM_KubernetesAPI)Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container.ExecutionMediumLinuxAzure Defender
198Unusual config reset in your virtual machine(ARM_VMAccessUnusualConfigReset)An unusual config reset was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.While this action may be legitimate, attackers can try utilizing VM Access extension to reset the configuration in your virtual machine and compromise it.Credential AccessMediumLinuxAzure Defender
199Unusual deletion of custom script extension in your virtual machine(ARM_CustomScriptExtensionUnusualDeletion)Unusual deletion of a custom script extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers may use custom script extensions to execute malicious code on your virtual machines via the Azure Resource Manager.ExecutionMediumLinuxAzure Defender
200Unusual execution of custom script extension in your virtual machine(ARM_CustomScriptExtensionUnusualExecution)Unusual execution of a custom script extension was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.Attackers may use custom script extensions to execute malicious code on your virtual machines via the Azure Resource Manager.ExecutionMediumLinuxAzure Defender
201Unusual user password reset in your virtual machine(ARM_VMAccessUnusualPasswordReset)An unusual user password reset was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.While this action may be legitimate, attackers can try utilizing the VM Access extension to reset the credentials of a local user in your virtual machine and compromise it.Credential AccessMediumLinuxAzure Defender
202Unusual user SSH key reset in your virtual machine(ARM_VMAccessUnusualSSHReset)An unusual user SSH key reset was detected in your virtual machine by analyzing the Azure Resource Manager operations in your subscription.While this action may be legitimate, attackers can try utilizing VM Access extension to reset SSH key of a user account in your virtual machine and compromise it.Credential AccessMediumLinuxAzure Defender
203An attempt to run Linux commands on a Windows App Service(AppServices_LinuxCommandOnWindows)Analysis of App Service processes detected an attempt to run a Linux command on a Windows App Service. This action was running by the web application. This behavior is often seen during campaigns that exploit a vulnerability in a common web application.(Applies to: App Service on Windows)-MediumAzure App ServiceAzure Defender
204An IP that connected to your Azure App Service FTP Interface was found in Threat Intelligence(AppServices_IncomingTiClientIpFtp)Azure App Service FTP log indicates a connection from a source address that was found in the threat intelligence feed. During this connection, a user accessed the pages listed.(Applies to: App Service on Windows and App Service on Linux)Initial AccessMediumAzure App ServiceAzure Defender
205Attempt to run high privilege command detected(AppServices_HighPrivilegeCommand)Analysis of App Service processes detected an attempt to run a command that requires high privileges.The command ran in the web application context. While this behavior can be legitimate, in web applications this behavior is also observed in malicious activities.(Applies to: App Service on Windows)-MediumAzure App ServiceAzure Defender
206Azure Security Center test alert for App Service (not a threat)(AppServices_EICAR)This is a test alert generated by Azure Security Center. No further action is needed.(Applies to: App Service on Windows and App Service on Linux)-HighAzure App ServiceAzure Defender
207Connection to web page from anomalous IP address detected(AppServices_AnomalousPageAccess)Azure App Service activity log indicates an anomalous connection to a sensitive web page from the listed source IP address. This might indicate that someone is attempting a brute force attack into your web app administration pages. It might also be the result of a new IP address being used by a legitimate user. If the source IP address is trusted, you can safely suppress this alert for this resource. To learn how to suppress Azure Defender alerts, see Suppress alerts from Azure Defender. (Applies to: App Service on Windows and App Service on Linux)Initial AccessMediumAzure App ServiceAzure Defender
208Dangling DNS record for an App Service resource detected(AppServices_DanglingDomain)A DNS record that points to a recently deleted App Service resource (also known as "dangling DNS" entry) has been detected. This leaves you susceptible to a subdomain takeover. Subdomain takeovers enable malicious actors to redirect traffic intended for an organizations domain to a site performing malicious activity.(Applies to: App Service on Windows and App Service on Linux)-HighAzure App ServiceAzure Defender
209Detected encoded executable in command line data(AppServices_Base64EncodedExecutableInCommandLineParams)Analysis of host data on {Compromised host} detected a base-64 encoded executable. This has previously been associated with attackers attempting to construct executables on-the-fly through a sequence of commands, and attempting to evade intrusion detection systems by ensuring that no individual command would trigger an alert. This could be legitimate activity, or an indication of a compromised host.(Applies to: App Service on Windows)Defense Evasion, ExecutionHighAzure App ServiceAzure Defender
210Detected file download from a known malicious source(AppServices_SuspectDownload)Analysis of host data has detected the download of a file from a known malware source on your host.(Applies to: App Service on Linux)Privilege Escalation, Execution, Exfiltration, Command and ControlMediumAzure App ServiceAzure Defender
211Digital currency mining related behavior detected(AppServices_DigitalCurrencyMining)Analysis of host data on Inn-Flow-WebJobs detected the execution of a process or command normally associated with digital currency mining.(Applies to: App Service on Windows and App Service on Linux)ExecutionHighAzure App ServiceAzure Defender
212Executable decoded using certutil(AppServices_ExecutableDecodedUsingCertutil)Analysis of host data on [Compromised entity] detected that certutil.exe, a built-in administrator utility, was being used to decode an executable instead of its mainstream purpose that relates to manipulating certificates and certificate data. Attackers are known to abuse functionality of legitimate administrator tools to perform malicious actions, for example using a tool such as certutil.exe to decode a malicious executable that will then be subsequently executed.(Applies to: App Service on Windows)Defense Evasion, ExecutionHighAzure App ServiceAzure Defender
213Fileless Attack Behavior Detected(AppServices_FilelessAttackBehaviorDetection)The memory of the process specified below contains behaviors commonly used by fileless attacks.Specific behaviors include: {list of observed behaviors}(Applies to: App Service on Windows and App Service on Linux)ExecutionMediumAzure App ServiceAzure Defender
214Fileless Attack Technique Detected(AppServices_FilelessAttackTechniqueDetection)The memory of the process specified below contains evidence of a fileless attack technique. Fileless attacks are used by attackers to execute code while evading detection by security software.Specific behaviors include: {list of observed behaviors}(Applies to: App Service on Windows and App Service on Linux)ExecutionHighAzure App ServiceAzure Defender
215Fileless Attack Toolkit Detected(AppServices_FilelessAttackToolkitDetection)The memory of the process specified below contains a fileless attack toolkit: {ToolKitName}. Fileless attack toolkits typically do not have a presence on the filesystem, making detection by traditional anti-virus software difficult.Specific behaviors include: {list of observed behaviors}(Applies to: App Service on Windows and App Service on Linux)Defense Evasion, ExecutionHighAzure App ServiceAzure Defender
216NMap scanning detected(AppServices_Nmap)Azure App Service activity log indicates a possible web fingerprinting activity on your App Service resource.The suspicious activity detected is associated with NMAP. Attackers often use this tool for probing the web application to find vulnerabilities.(Applies to: App Service on Windows and App Service on Linux)PreAttackMediumAzure App ServiceAzure Defender
217Phishing content hosted on Azure Webapps(AppServices_PhishingContent)URL used for phishing attack found on the Azure AppServices website. This URL was part of a phishing attack sent to Microsoft 365 customers. The content typically lures visitors into entering their corporate credentials or financial information into a legitimate looking website.(Applies to: App Service on Windows and App Service on Linux)CollectionHighAzure App ServiceAzure Defender
218PHP file in upload folder(AppServices_PhpInUploadFolder)Azure App Service activity log indicates an access to a suspicious PHP page located in the upload folder.This type of folder does not usually contain PHP files. The existence of this type of file might indicate an exploitation taking advantage of arbitrary file upload vulnerabilities.(Applies to: App Service on Windows and App Service on Linux)ExecutionMediumAzure App ServiceAzure Defender
219Possible Cryptocoinminer download detected(AppServices_CryptoCoinMinerDownload)Analysis of host data has detected the download of a file normally associated with digital currency mining.(Applies to: App Service on Linux)Defense Evasion, Command and Control, ExploitationMediumAzure App ServiceAzure Defender
220Potential dangling DNS record for an App Service resource detected(AppServices_PotentialDanglingDomain)A DNS record that points to a recently deleted App Service resource (also known as "dangling DNS" entry) has been detected. This might leave you susceptible to a subdomain takeover. Subdomain takeovers enable malicious actors to redirect traffic intended for an organizations domain to a site performing malicious activity. In this case, a text record with the Domain Verification ID was found. Such text records prevent subdomain takeover but we still recommend removing the dangling domain. If you leave the DNS record pointing at the subdomain youre at risk if anyone in your organization deletes the TXT file or record in the future.(Applies to: App Service on Windows and App Service on Linux)-LowAzure App ServiceAzure Defender
221Potential reverse shell detected(AppServices_ReverseShell)Analysis of host data detected a potential reverse shell. These are used to get a compromised machine to call back into a machine an attacker owns.(Applies to: App Service on Linux)Exfiltration, ExploitationMediumAzure App ServiceAzure Defender
222Raw data download detected(AppServices_DownloadCodeFromWebsite)Analysis of App Service processes detected an attempt to download code from raw-data websites such as Pastebin. This action was run by a PHP process. This behavior is associated with attempts to download web shells or other malicious components to the App Service.(Applies to: App Service on Windows)ExecutionMediumAzure App ServiceAzure Defender
223Saving curl output to disk detected(AppServices_CurlToDisk)Analysis of App Service processes detected the running of a curl command in which the output was saved to the disk. While this behavior can be legitimate, in web applications this behavior is also observed in malicious activities such as attempts to infect websites with web shells.(Applies to: App Service on Windows)-LowAzure App ServiceAzure Defender
224Spam folder referrer detected(AppServices_SpamReferrer)Azure App Service activity log indicates web activity that was identified as originating from a web site associated with spam activity. This can occur if your website is compromised and used for spam activity.(Applies to: App Service on Windows and App Service on Linux)-LowAzure App ServiceAzure Defender
225Suspicious access to possibly vulnerable web page detected(AppServices_ScanSensitivePage)Azure App Service activity log indicates a web page that seems to be sensitive was accessed. This suspicious activity originated from a source IP address whose access pattern resembles that of a web scanner.This activity is often associated with an attempt by an attacker to scan your network to try and gain access to sensitive or vulnerable web pages.(Applies to: App Service on Windows and App Service on Linux)-LowAzure App ServiceAzure Defender
226Suspicious domain name reference(AppServices_CommandlineSuspectDomain)Analysis of host data detected reference to suspicious domain name. Such activity, while possibly legitimate user behavior, is frequently an indication of the download or execution of malicious software. Typical related attacker activity is likely to include the download and execution of further malicious software or remote administration tools.(Applies to: App Service on Linux)ExfiltrationLowAzure App ServiceAzure Defender
227Suspicious download using Certutil detected(AppServices_DownloadUsingCertutil)Analysis of host data on {NAME} detected the use of certutil.exe, a built-in administrator utility, for the download of a binary instead of its mainstream purpose that relates to manipulating certificates and certificate data. Attackers are known to abuse functionality of legitimate administrator tools to perform malicious actions, for example using certutil.exe to download and decode a malicious executable that will then be subsequently executed.(Applies to: App Service on Windows)ExecutionMediumAzure App ServiceAzure Defender
228Suspicious PHP execution detected(AppServices_SuspectPhp)Machine logs indicate that a suspicious PHP process is running. The action included an attempt to run operating system commands or PHP code from the command line, by using the PHP process. While this behavior can be legitimate, in web applications this behavior might indicate malicious activities, such as attempts to infect websites with web shells.(Applies to: App Service on Windows and App Service on Linux)ExecutionMediumAzure App ServiceAzure Defender
229Suspicious PowerShell cmdlets executed(AppServices_PowerShellPowerSploitScriptExecution)Analysis of host data indicates execution of known malicious PowerShell PowerSploit cmdlets.(Applies to: App Service on Windows)ExecutionMediumAzure App ServiceAzure Defender
230Suspicious process executed(AppServices_KnownCredential AccessTools)Machine logs indicate that the suspicious process: '%{process path}' was running on the machine, often associated with attacker attempts to access credentials.(Applies to: App Service on Windows)Credential AccessHighAzure App ServiceAzure Defender
231Suspicious process name detected(AppServices_ProcessWithKnownSuspiciousExtension)Analysis of host data on {NAME} detected a process whose name is suspicious, for example corresponding to a known attacker tool or named in a way that is suggestive of attacker tools that try to hide in plain sight. This process could be legitimate activity, or an indication that one of your machines has been compromised.(Applies to: App Service on Windows)Persistence, Defense EvasionMediumAzure App ServiceAzure Defender
232Suspicious SVCHOST process executed(AppServices_SVCHostFromInvalidPath)The system process SVCHOST was observed running in an abnormal context. Malware often use SVCHOST to mask its malicious activity.(Applies to: App Service on Windows)Defense Evasion, ExecutionHighAzure App ServiceAzure Defender
233Suspicious User Agent detected(AppServices_UserAgentInjection)Azure App Service activity log indicates requests with suspicious user agent. This behavior can indicate on attempts to exploit a vulnerability in your App Service application.(Applies to: App Service on Windows and App Service on Linux)Initial AccessMediumAzure App ServiceAzure Defender
234Suspicious WordPress theme invocation detected(AppServices_WpThemeInjection)Azure App Service activity log indicates a possible code injection activity on your App Service resource.The suspicious activity detected resembles that of a manipulation of WordPress theme to support server side execution of code, followed by a direct web request to invoke the manipulated theme file.This type of activity was seen in the past as part of an attack campaign over WordPress.If your App Service resource isnt hosting a WordPress site, it isnt vulnerable to this specific code injection exploit and you can safely suppress this alert for the resource. To learn how to suppress Azure Defender alerts, see Suppress alerts from Azure Defender.(Applies to: App Service on Windows and App Service on Linux)ExecutionHighAzure App ServiceAzure Defender
235Vulnerability scanner detected(AppServices_DrupalScanner)Azure App Service activity log indicates that a possible vulnerability scanner was used on your App Service resource.The suspicious activity detected resembles that of tools targeting a content management system (CMS).If your App Service resource isnt hosting a Drupal site, it isnt vulnerable to this specific code injection exploit and you can safely suppress this alert for the resource. To learn how to suppress Azure Defender alerts, see Suppress alerts from Azure Defender.(Applies to: App Service on Windows)PreAttackMediumAzure App ServiceAzure Defender
236Vulnerability scanner detected(AppServices_JoomlaScanner)Azure App Service activity log indicates that a possible vulnerability scanner was used on your App Service resource.The suspicious activity detected resembles that of tools targeting Joomla applications.If your App Service resource isnt hosting a Joomla site, it isnt vulnerable to this specific code injection exploit and you can safely suppress this alert for the resource. To learn how to suppress Azure Defender alerts, see Suppress alerts from Azure Defender.(Applies to: App Service on Windows and App Service on Linux)PreAttackMediumAzure App ServiceAzure Defender
237Vulnerability scanner detected(AppServices_WpScanner)Azure App Service activity log indicates that a possible vulnerability scanner was used on your App Service resource.The suspicious activity detected resembles that of tools targeting WordPress applications.If your App Service resource isnt hosting a WordPress site, it isnt vulnerable to this specific code injection exploit and you can safely suppress this alert for the resource. To learn how to suppress Azure Defender alerts, see Suppress alerts from Azure Defender.(Applies to: App Service on Windows and App Service on Linux)PreAttackMediumAzure App ServiceAzure Defender
238Web fingerprinting detected(AppServices_WebFingerprinting)Azure App Service activity log indicates a possible web fingerprinting activity on your App Service resource.The suspicious activity detected is associated with a tool called Blind Elephant. The tool fingerprint web servers and tries to detect the installed applications and version.Attackers often use this tool for probing the web application to find vulnerabilities.(Applies to: App Service on Windows and App Service on Linux)PreAttackMediumAzure App ServiceAzure Defender
239Website is tagged as malicious in threat intelligence feed(AppServices_SmartScreen)Your website as described below is marked as a malicious site by Windows SmartScreen. If you think this is a false positive, contact Windows SmartScreen via report feedback link provided.(Applies to: App Service on Windows and App Service on Linux)CollectionMediumAzure App ServiceAzure Defender
240Possible loss of data detected(AppServices_DataEgressArtifacts)Analysis of host/device data detected a possible data egress condition. Attackers will often egress data from machines they have compromised.(Applies to: App Service on Linux)Collection, ExfiltrationMediumAzure App ServiceAzure Defender
241Detected suspicious file download(AppServices_SuspectDownloadArtifacts)Analysis of host data has detected suspicious download of remote file.(Applies to: App Service on Linux)PersistenceMediumAzure App ServiceAzure Defender
242K8S API requests from proxy IP address detected(K8S_TI_Proxy)Kubernetes audit log analysis detected API requests to your cluster from an IP address that is associated with proxy services, such as TOR. While this behavior can be legitimate, it's often seen in malicious activities, when attackers try to hide their source IP.ExecutionLowAzure Kubernetes Service clustersAzure Defender
243Container with a sensitive volume mount detected(K8S_SensitiveMount)Kubernetes audit log analysis detected a new container with a sensitive volume mount. The volume that was detected is a hostPath type which mounts a sensitive file or folder from the node to the container. If the container gets compromised, the attacker can use this mount for gaining access to the node.Privilege EscalationMediumAzure Kubernetes Service clustersAzure Defender
244CoreDNS modification in Kubernetes detected(K8S_CoreDnsModification)Kubernetes audit log analysis detected a modification of the CoreDNS configuration. The configuration of CoreDNS can be modified by overriding its configmap. While this activity can be legitimate, if attackers have permissions to modify the configmap, they can change the behavior of the clusters DNS server and poison it.Lateral MovementLowAzure Kubernetes Service clustersAzure Defender
245Creation of admission webhook configuration detected(K8S_AdmissionController)Kubernetes audit log analysis detected a new admission webhook configuration. Kubernetes has two built-in generic admission controllers: MutatingAdmissionWebhook and ValidatingAdmissionWebhook. The behavior of these admission controllers is determined by an admission webhook that the user deploys to the cluster. The usage of such admission controllers can be legitimate, however attackers can use such webhooks for modifying the requests (in case of MutatingAdmissionWebhook) or inspecting the requests and gain sensitive information (in case of ValidatingAdmissionWebhook).Credential Access, PersistenceLowAzure Kubernetes Service clustersAzure Defender
246Digital currency mining container detected(K8S_MaliciousContainerImage)Kubernetes audit log analysis detected a container that has an image associated with a digital currency mining tool.ExecutionHighAzure Kubernetes Service clustersAzure Defender
247Exposed Kubeflow dashboard detected(K8S_ExposedKubeflow)The Kubernetes audit log analysis detected exposure of the Istio Ingress by a load balancer in a cluster that runs Kubeflow. This action might expose the Kubeflow dashboard to the internet. If the dashboard is exposed to the internet, attackers can access it and run malicious containers or code on the cluster. Find more details in the following article: https://www.microsoft.com/security/blog/2020/06/10/misconfigured-kubeflow-workloads-are-a-security-riskInitial AccessMediumAzure Kubernetes Service clustersAzure Defender
248Exposed Kubernetes dashboard detected(K8S_ExposedDashboard)Kubernetes audit log analysis detected exposure of the Kubernetes Dashboard by a LoadBalancer service. Exposed dashboard allows an unauthenticated access to the cluster management and poses a security threat.Initial AccessHighAzure Kubernetes Service clustersAzure Defender
249Exposed Kubernetes service detected(K8S_ExposedService)The Kubernetes audit log analysis detected exposure of a service by a load balancer. This service is related to a sensitive application that allows high impact operations in the cluster such as running processes on the node or creating new containers. In some cases, this service doesn't require authentication. If the service doesn't require authentication, exposing it to the internet poses a security risk.Initial AccessMediumAzure Kubernetes Service clustersAzure Defender
250Exposed Redis service in AKS detected(K8S_ExposedRedis)The Kubernetes audit log analysis detected exposure of a Redis service by a load balancer. If the service doesn't require authentication, exposing it to the internet poses a security risk.Initial AccessLowAzure Kubernetes Service clustersAzure Defender
251Kubernetes events deleted(K8S_DeleteEvents)Security Center detected that some Kubernetes events have been deleted. Kubernetes events are objects in Kubernetes which contain information about changes in the cluster. Attackers might delete those events for hiding their operations in the cluster.Defense EvasionMediumAzure Kubernetes Service clustersAzure Defender
252Kubernetes penetration testing tool detected(K8S_PenTestToolsKubeHunter)Kubernetes audit log analysis detected usage of Kubernetes penetration testing tool in the AKS cluster. While this behavior can be legitimate, attackers might use such public tools for malicious purposes.ExecutionLowAzure Kubernetes Service clustersAzure Defender
253New container in the kube-system namespace detected(K8S_KubeSystemContainer)Kubernetes audit log analysis detected a new container in the kube-system namespace that isnt among the containers that normally run in this namespace. The kube-system namespaces should not contain user resources. Attackers can use this namespace for hiding malicious components.PersistenceLowAzure Kubernetes Service clustersAzure Defender
254New high privileges role detected(K8S_HighPrivilegesRole)Kubernetes audit log analysis detected a new role with high privileges. A binding to a role with high privileges gives the user\group high privileges in the cluster. Unnecessary privileges might cause privilege escalation in the cluster.PersistenceLowAzure Kubernetes Service clustersAzure Defender
255Privileged container detected(K8S_PrivilegedContainer)Kubernetes audit log analysis detected a new privileged container. A privileged container has access to the nodes resources and breaks the isolation between containers. If compromised, an attacker can use the privileged container to gain access to the node.Privilege EscalationLowAzure Kubernetes Service clustersAzure Defender
256Role binding to the cluster-admin role detected(K8S_ClusterAdminBinding)Kubernetes audit log analysis detected a new binding to the cluster-admin role which gives administrator privileges. Unnecessary administrator privileges might cause privilege escalation in the cluster.PersistenceLowAzure Kubernetes Service clustersAzure Defender
257Container with a miner image detected(VM_MinerInContainerImage)Machine logs indicate execution of a Docker container that run an image associated with a digital currency mining.ExecutionHighContainers- Host LevelAzure Defender
258Docker build operation detected on a Kubernetes node(VM_ImageBuildOnNode)Machine logs indicate a build operation of a container image on a Kubernetes node. While this behavior might be legitimate, attackers might build their malicious images locally to avoid detection.Defense EvasionLowContainers- Host LevelAzure Defender
259Exposed Docker daemon detected(VM_ExposedDocker)Machine logs indicate that your Docker daemon (dockerd) exposes a TCP socket. By default, Docker configuration, does not use encryption or authentication when a TCP socket is enabled. This enables full access to the Docker daemon, by anyone with access to the relevant port.Execution, ExploitationMediumContainers- Host LevelAzure Defender
260Privileged command run in container(VM_PrivilegedExecutionInContainer)Machine logs indicate that a privileged command was run in a Docker container. A privileged command has extended privileges on the host machine.Privilege EscalationLowContainers- Host LevelAzure Defender
261Privileged Container Detected(VM_PrivilegedContainerArtifacts)Machine logs indicate that a privileged Docker container is running. A privileged container has a full access to the host's resources. If compromised, an attacker can use the privileged container to gain access to the host machine.Privilege Escalation, ExecutionLowContainers- Host LevelAzure Defender
262SSH server is running inside a container(VM_ContainerSSH)Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached.ExecutionMediumContainers- Host LevelAzure Defender
263Suspicious request to Kubernetes API(VM_KubernetesAPI)Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container.ExecutionMediumContainers- Host LevelAzure Defender
264Suspicious request to the Kubernetes Dashboard(VM_KubernetesDashboard)Machine logs indicate that a suspicious request was made to the Kubernetes Dashboard. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container.Lateral movementMediumContainers- Host LevelAzure Defender
265A possible vulnerability to SQL Injection(SQL.VM_VulnerabilityToSqlInjectionSQL.DB_VulnerabilityToSqlInjectionSQL.MI_VulnerabilityToSqlInjectionSQL.DW_VulnerabilityToSqlInjection)An application has generated a faulty SQL statement in the database. This can indicate a possible vulnerability to SQL injection attacks. There are two possible reasons for a faulty statement. A defect in application code might have constructed the faulty SQL statement. Or, application code or stored procedures didn't sanitize user input when constructing the faulty SQL statement, which can be exploited for SQL injection.PreAttackMediumSQL Database and Synapse AnalyticsAzure Defender
266Attempted logon by a potentially harmful application(SQL.DB_HarmfulApplicationSQL.VM_HarmfulApplicationSQL.MI_HarmfulApplicationSQL.DW_HarmfulApplication)A potentially harmful application attempted to access SQL server '{name}'.PreAttackHighSQL Database and Synapse AnalyticsAzure Defender
267Log on from an unusual Azure Data Center(SQL.DB_DataCenterAnomalySQL.VM_DataCenterAnomalySQL.DW_DataCenterAnomalySQL.MI_DataCenterAnomaly)There has been a change in the access pattern to an SQL Server, where someone has signed in to the server from an unusual Azure Data Center. In some cases, the alert detects a legitimate action (a new application or Azure service). In other cases, the alert detects a malicious action (attacker operating from breached resource in Azure).ProbingLowSQL Database and Synapse AnalyticsAzure Defender
268Log on from an unusual location(SQL.DB_GeoAnomalySQL.VM_GeoAnomalySQL.DW_GeoAnomalySQL.MI_GeoAnomaly)There has been a change in the access pattern to SQL Server, where someone has signed in to the server from an unusual geographical location. In some cases, the alert detects a legitimate action (a new application or developer maintenance). In other cases, the alert detects a malicious action (a former employee or external attacker).ExploitationMediumSQL Database and Synapse AnalyticsAzure Defender
269Login from a principal user not seen in 60 days(SQL.DB_PrincipalAnomalySQL.VM_PrincipalAnomalySQL.DW_PrincipalAnomalySQL.MI_PrincipalAnomaly)A principal user not seen in the last 60 days has logged into your database. If this database is new or this is expected behavior caused by recent changes in the users accessing the database, Security Center will identify significant changes to the access patterns and attempt to prevent future false positives.ExploitationMediumSQL Database and Synapse AnalyticsAzure Defender
270Login from a suspicious IP(SQL.VM_SuspiciousIpAnomaly)Your resource has been accessed successfully from an IP address that Microsoft Threat Intelligence has associated with suspicious activity.PreAttackMediumSQL Database and Synapse AnalyticsAzure Defender
271Potential SQL Brute Force attemptAn abnormally high number of failed sign in attempts with different credentials have occurred. In some cases, the alert detects penetration testing in action. In other cases, the alert detects a brute force attack.ProbingHighSQL Database and Synapse AnalyticsAzure Defender
272Potential SQL injection(SQL.DB_PotentialSqlInjectionSQL.VM_PotentialSqlInjectionSQL.MI_PotentialSqlInjectionSQL.DW_PotentialSqlInjectionSynapse.SQLPool_PotentialSqlInjection)An active exploit has occurred against an identified application vulnerable to SQL injection. This means an attacker is trying to inject malicious SQL statements by using the vulnerable application code or stored procedures.PreAttackHighSQL Database and Synapse AnalyticsAzure Defender
273Potentially Unsafe Action(SQL.DB_UnsafeCommandsSQL.MI_UnsafeCommandsSQL.DW_UnsafeCommands)A potentially unsafe action was attempted on your database '{name}' on server '{name}'.-HighSQL Database and Synapse AnalyticsAzure Defender
274Suspected brute force attack using a valid userA potential brute force attack has been detected on your resource. The attacker is using the valid user sa, which has permissions to login.PreAttackHighSQL Database and Synapse AnalyticsAzure Defender
275Suspected brute force attackA potential brute force attack has been detected on your SQL server '{name}'.PreAttackHighSQL Database and Synapse AnalyticsAzure Defender
276Suspected successful brute force attack(SQL.DB_BruteForceSQL.VM_BruteForceSQL.DW_BruteForceSQL.MI_BruteForce)A successful login occurred after an apparent brute force attack on your resourcePreAttackHighSQL Database and Synapse AnalyticsAzure Defender
277Unusual export locationSomeone has extracted a massive amount of data from your SQL Server '{name}' to an unusual location.ExfiltrationHighSQL Database and Synapse AnalyticsAzure Defender
278Suspected brute force attack using a valid user(SQL.PostgreSQL_BruteForceSQL.MariaDB_BruteForceSQL.MySQL_BruteForce)A potential brute force attack has been detected on your resource. The attacker is using the valid user (username), which has permissions to login.PreAttackHighOpen source relational DatabasesAzure Defender
279Suspected successful brute force attack(SQL.PostgreSQL_BruteForceSQL.MySQL_BruteForceSQL.MariaDB_BruteForce)A successful login occurred after an apparent brute force attack on your resource.PreAttackHighOpen source relational DatabasesAzure Defender
280Suspected brute force attack("SQL.MySQL_BruteForce")A potential brute force attack has been detected on your SQL server '{name}'.PreAttackHighOpen source relational DatabasesAzure Defender
281Attempted logon by a potentially harmful application(SQL.PostgreSQL_HarmfulApplicationSQL.MariaDB_HarmfulApplicationSQL.MySQL_HarmfulApplication)A potentially harmful application attempted to access your resource.PreAttackHighOpen source relational DatabasesAzure Defender
282Login from a principal user not seen in 60 days(SQL.PostgreSQL_PrincipalAnomalySQL.MariaDB_PrincipalAnomalySQL.MySQL_PrincipalAnomaly)A principal user not seen in the last 60 days has logged into your database. If this database is new or this is expected behavior caused by recent changes in the users accessing the database, Security Center will identify significant changes to the access patterns and attempt to prevent future false positives.ExploitationMediumOpen source relational DatabasesAzure Defender
283Login from a domain not seen in 60 days(SQL.MariaDB_DomainAnomalySQL.PostgreSQL_DomainAnomalySQL.MySQL_DomainAnomaly)A user has logged in to your resource from a domain no other users have connected from in the last 60 days. If this resource is new or this is expected behavior caused by recent changes in the users accessing the resource, Security Center will identify significant changes to the access patterns and attempt to prevent future false positives.ExploitationMediumOpen source relational DatabasesAzure Defender
284Log on from an unusual Azure Data Center(SQL.PostgreSQL_DataCenterAnomalySQL.MariaDB_DataCenterAnomalySQL.MySQL_DataCenterAnomaly)Someone logged on to your resource from an unusual Azure Data Center.ProbingLowOpen source relational DatabasesAzure Defender
285Logon from an unusual cloud provider(SQL.PostgreSQL_CloudProviderAnomalySQL.MariaDB_CloudProviderAnomalySQL.MySQL_CloudProviderAnomaly)Someone logged on to your resource from a cloud provider not seen in the last 60 days. It's quick and easy for threat actors to obtain disposable compute power for use in their campaigns. If this is expected behavior caused by the recent adoption of a new cloud provider, Security Center will learn over time and attempt to prevent future false positives.ExploitationMediumOpen source relational DatabasesAzure Defender
286Log on from an unusual location(SQL.MariaDB_GeoAnomalySQL.PostgreSQL_GeoAnomalySQL.MySQL_GeoAnomaly)Someone logged on to your resource from an unusual Azure Data Center.ExploitationMediumOpen source relational DatabasesAzure Defender
287Login from a suspicious IP(SQL.PostgreSQL_SuspiciousIpAnomalySQL.MariaDB_SuspiciousIpAnomalySQL.MySQL_SuspiciousIpAnomaly)Your resource has been accessed successfully from an IP address that Microsoft Threat Intelligence has associated with suspicious activity.PreAttackMediumOpen source relational DatabasesAzure Defender
288Azure Resource Manager operation from suspicious IP address (Preview)(ARM_OperationFromSuspiciousIP)Azure Defender for Resource Manager detected an operation from an IP address that has been marked as suspicious in threat intelligence feeds.ExecutionMediumAzure Resource ManagerAzure Defender
289Azure Resource Manager operation from suspicious proxy IP address (Preview)(ARM_OperationFromSuspiciousProxyIP)Azure Defender for Resource Manager detected a resource management operation from an IP address that is associated with proxy services, such as TOR. While this behavior can be legitimate, it's often seen in malicious activities, when threat actors try to hide their source IP.Defense EvasionMediumAzure Resource ManagerAzure Defender
290MicroBurst exploitation toolkit used to enumerate resources in your subscriptions(ARM_MicroBurst.AzDomainInfo)MicroBurst's Information Gathering module was run on your subscription. This tool can be used to discover resources, permissions and network structures. This was detected by analyzing the Azure Activity logs and resource management operations in your subscription-HighAzure Resource ManagerAzure Defender
291MicroBurst exploitation toolkit used to enumerate resources in your subscriptions(ARM_MicroBurst.AzureDomainInfo)MicroBurst's Information Gathering module was run on your subscription. This tool can be used to discover resources, permissions and network structures. This was detected by analyzing the Azure Activity logs and resource management operations in your subscription-HighAzure Resource ManagerAzure Defender
292MicroBurst exploitation toolkit used to execute code on your virtual machine(ARM_MicroBurst.AzVMBulkCMD)MicroBurst's exploitation toolkit was used to execute code on your virtual machines. This was detected by analyzing Azure Resource Manager operations in your subscription.ExecutionHighAzure Resource ManagerAzure Defender
293MicroBurst exploitation toolkit used to execute code on your virtual machine(RM_MicroBurst.AzureRmVMBulkCMD)MicroBurst's exploitation toolkit was used to execute code on your virtual machines. This was detected by analyzing Azure Resource Manager operations in your subscription.-HighAzure Resource ManagerAzure Defender
294MicroBurst exploitation toolkit used to extract keys from your Azure key vaults(ARM_MicroBurst.AzKeyVaultKeysREST)MicroBurst's exploitation toolkit was used to extract keys from your Azure key vaults. This was detected by analyzing Azure Activity logs and resource management operations in your subscription.-HighAzure Resource ManagerAzure Defender
295MicroBurst exploitation toolkit used to extract keys to your storage accounts(ARM_MicroBurst.AZStorageKeysREST)MicroBurst's exploitation toolkit was used to extract keys to your storage accounts. This was detected by analyzing Azure Activity logs and resource management operations in your subscription.CollectionHighAzure Resource ManagerAzure Defender
296MicroBurst exploitation toolkit used to extract secrets from your Azure key vaults(ARM_MicroBurst.AzKeyVaultSecretsREST)MicroBurst's exploitation toolkit was used to extract secrets from your Azure key vaults. This was detected by analyzing Azure Activity logs and resource management operations in your subscription.-HighAzure Resource ManagerAzure Defender
297Permissions granted for an RBAC role in an unusual way for your Azure environment (Preview)(ARM_AnomalousRBACRoleAssignment)Azure Defender for Resource Manager detected an RBAC role assignment that's unusual when compared with other assignments performed by the same assigner / performed for the same assignee / in your tenant due to the following anomalies: assignment time, assigner location, assigner, authentication method, assigned entities, client software used, assignment extent. This operation might have been performed by a legitimate user in your organization. Alternatively, it might indicate that an account in your organization was breached, and that the threat actor is trying to grant permissions to an additional user account they own.Lateral Movement, Defense EvasionMediumAzure Resource ManagerAzure Defender
298PowerZure exploitation toolkit used to elevate access from Azure AD to Azure(ARM_PowerZure.AzureElevatedPrivileges)PowerZure exploitation toolkit was used to elevate access from AzureAD to Azure. This was detected by analyzing Azure Resource Manager operations in your tenant.-HighAzure Resource ManagerAzure Defender
299PowerZure exploitation toolkit used to enumerate resources(ARM_PowerZure.GetAzureTargets)PowerZure exploitation toolkit was used to enumerate resources on behalf of a legitimate user account in your organization. This was detected by analyzing Azure Resource Manager operations in your subscription.CollectionHighAzure Resource ManagerAzure Defender
300PowerZure exploitation toolkit used to enumerate storage containers, shares, and tables(ARM_PowerZure.ShowStorageContent)PowerZure exploitation toolkit was used to enumerate storage shares, tables, and containers. This was detected by analyzing Azure Resource Manager operations in your subscription.-HighAzure Resource ManagerAzure Defender
301PowerZure exploitation toolkit used to execute a Runbook in your subscription(ARM_PowerZure.StartRunbook)PowerZure exploitation toolkit was used to execute a Runbook. This was detected by analyzing Azure Resource Manager operations in your subscription.-HighAzure Resource ManagerAzure Defender
302PowerZure exploitation toolkit used to extract Runbooks content(ARM_PowerZure.AzureRunbookContent)PowerZure exploitation toolkit was used to extract Runbook content. This was detected by analyzing Azure Resource Manager operations in your subscription.CollectionHighAzure Resource ManagerAzure Defender
303PREVIEW - Activity from a risky IP address(ARM.MCAS_ActivityFromAnonymousIPAddresses)Users activity from an IP address that has been identified as an anonymous proxy IP address has been detected.These proxies are used by people who want to hide their device's IP address, and can be used for malicious intent. This detection uses a machine learning algorithm that reduces false positives, such as mis-tagged IP addresses that are widely used by users in the organization.Requires an active Microsoft Cloud App Security license.-MediumAzure Resource ManagerAzure Defender
304PREVIEW - Activity from infrequent country(ARM.MCAS_ActivityFromInfrequentCountry)Activity from a location that wasn't recently or ever visited by any user in the organization has occurred.This detection considers past activity locations to determine new and infrequent locations. The anomaly detection engine stores information about previous locations used by users in the organization.Requires an active Microsoft Cloud App Security license.-MediumAzure Resource ManagerAzure Defender
305PREVIEW - Azurite toolkit run detected(ARM_Azurite)A known cloud-environment reconnaissance toolkit run has been detected in your environment. The tool Azurite can be used by an attacker (or penetration tester) to map your subscriptions' resources and identify insecure configurations.CollectionHighAzure Resource ManagerAzure Defender
306PREVIEW - Impossible travel activity(ARM.MCAS_ImpossibleTravelActivity)Two user activities (in a single or multiple sessions) have occurred, originating from geographically distant locations. This occurs within a time period shorter than the time it would have taken the user to travel from the first location to the second. This indicates that a different user is using the same credentials.This detection uses a machine learning algorithm that ignores obvious false positives contributing to the impossible travel conditions, such as VPNs and locations regularly used by other users in the organization. The detection has an initial learning period of seven days, during which it learns a new user's activity pattern.Requires an active Microsoft Cloud App Security license.-MediumAzure Resource ManagerAzure Defender
307PREVIEW - Suspicious management session using an inactive account detected(ARM_UnusedAccountPersistence)Subscription activity logs analysis has detected suspicious behavior. A principal not in use for a long period of time is now performing actions that can secure persistence for an attacker.PersistenceMediumAzure Resource ManagerAzure Defender
308PREVIEW - Suspicious management session using PowerShell detected(ARM_UnusedAppPowershellPersistence)Subscription activity logs analysis has detected suspicious behavior. A principal that doesn't regularly use PowerShell to manage the subscription environment is now using PowerShell, and performing actions that can secure persistence for an attacker.PersistenceMediumAzure Resource ManagerAzure Defender
309PREVIEW – Suspicious management session using Azure portal detected(ARM_UnusedAppIbizaPersistence)Analysis of your subscription activity logs has detected a suspicious behavior. A principal that doesn't regularly use the Azure portal (Ibiza) to manage the subscription environment (hasn't used Azure portal to manage for the last 45 days, or a subscription that it is actively managing), is now using the Azure portal and performing actions that can secure persistence for an attacker.PersistenceMediumAzure Resource ManagerAzure Defender
310Privileged custom role created for your subscription in a suspicious way (Preview)(ARM_PrivilegedRoleDefinitionCreation)Azure Defender for Resource Manager detected a suspicious creation of privileged custom role definition in your subscription. This operation might have been performed by a legitimate user in your organization. Alternatively, it might indicate that an account in your organization was breached, and that the threat actor is trying to create a privileged role to use in the future to evade detection.Privilege Escalation, Defense EvasionLowAzure Resource ManagerAzure Defender
311Usage of MicroBurst exploitation toolkit to run an arbitrary code or exfiltrate Azure Automation account credentials(ARM_MicroBurst.RunCodeOnBehalf)Usage of MicroBurst exploitation toolkit to run an arbitrary code or exfiltrate Azure Automation account credentials. This was detected by analyzing Azure Resource Manager operations in your subscription.Persistence, Credential AccessHighAzure Resource ManagerAzure Defender
312Usage of NetSPI techniques to maintain persistence in your Azure environment(ARM_NetSPI.MaintainPersistence)Usage of NetSPI persistence technique to create a webhook backdoor and maintain persistence in your Azure environment. This was detected by analyzing Azure Resource Manager operations in your subscription.-HighAzure Resource ManagerAzure Defender
313Usage of PowerZure exploitation toolkit to run an arbitrary code or exfiltrate Azure Automation account credentials(ARM_PowerZure.RunCodeOnBehalf)PowerZure exploitation toolkit detected attempting to run code or exfiltrate Azure Automation account credentials. This was detected by analyzing Azure Resource Manager operations in your subscription.-HighAzure Resource ManagerAzure Defender
314Usage of PowerZure function to maintain persistence in your Azure environment(ARM_PowerZure.MaintainPersistence)PowerZure exploitation toolkit detected creating a webhook backdoor to maintain persistence in your Azure environment. This was detected by analyzing Azure Resource Manager operations in your subscription.-HighAzure Resource ManagerAzure Defender
315Anomalous network protocol usage(AzureDNS_ProtocolAnomaly)Analysis of DNS transactions from %{CompromisedEntity} detected anomalous protocol usage. Such traffic, while possibly benign, may indicate abuse of this common protocol to bypass network traffic filtering. Typical related attacker activity includes copying remote administration tools to a compromised host and exfiltrating user data from it.Exfiltration-Azure DNSAzure Defender
316Anonymity network activity(AzureDNS_DarkWeb)Analysis of DNS transactions from %{CompromisedEntity} detected anonymity network activity. Such activity, while possibly legitimate user behavior, is frequently employed by attackers to evade tracking and fingerprinting of network communications. Typical related attacker activity is likely to include the download and execution of malicious software or remote administration tools.Exfiltration-Azure DNSAzure Defender
317Anonymity network activity using web proxy(AzureDNS_DarkWebProxy)Analysis of DNS transactions from %{CompromisedEntity} detected anonymity network activity. Such activity, while possibly legitimate user behavior, is frequently employed by attackers to evade tracking and fingerprinting of network communications. Typical related attacker activity is likely to include the download and execution of malicious software or remote administration tools.Exfiltration-Azure DNSAzure Defender
318Attempted communication with suspicious sinkholed domain(AzureDNS_SinkholedDomain)Analysis of DNS transactions from %{CompromisedEntity} detected request for sinkholed domain. Such activity, while possibly legitimate user behavior, is frequently an indication of the download or execution of malicious software. Typical related attacker activity is likely to include the download and execution of further malicious software or remote administration tools.Exfiltration-Azure DNSAzure Defender
319Communication with possible phishing domain(AzureDNS_PhishingDomain)Analysis of DNS transactions from %{CompromisedEntity} detected a request for a possible phishing domain. Such activity, while possibly benign, is frequently performed by attackers to harvest credentials to remote services. Typical related attacker activity is likely to include the exploitation of any credentials on the legitimate service.Exfiltration-Azure DNSAzure Defender
320Communication with suspicious algorithmically generated domain(AzureDNS_DomainGenerationAlgorithm)Analysis of DNS transactions from %{CompromisedEntity} detected possible usage of a domain generation algorithm. Such activity, while possibly benign, is frequently performed by attackers to evade network monitoring and filtering. Typical related attacker activity is likely to include the download and execution of malicious software or remote administration tools.Exfiltration-Azure DNSAzure Defender
321Communication with suspicious domain identified by threat intelligence(AzureDNS_ThreatIntelSuspectDomain)Communication with suspicious domain was detected by analyzing DNS transactions from your resource and comparing against known malicious domains identified by threat intelligence feeds. Communication to malicious domains is frequently performed by attackers and could imply that your resource is compromised."Initial AccessMediumAzure DNSAzure Defender
322Communication with suspicious random domain name(AzureDNS_RandomizedDomain)Analysis of DNS transactions from %{CompromisedEntity} detected usage of a suspicious randomly generated domain name. Such activity, while possibly benign, is frequently performed by attackers to evade network monitoring and filtering. Typical related attacker activity is likely to include the download and execution of malicious software or remote administration tools.Exfiltration-Azure DNSAzure Defender
323Digital currency mining activity(AzureDNS_CurrencyMining)Analysis of DNS transactions from %{CompromisedEntity} detected digital currency mining activity. Such activity, while possibly legitimate user behavior, is frequently performed by attackers following compromise of resources. Typical related attacker activity is likely to include the download and execution of common mining tools.Exfiltration-Azure DNSAzure Defender
324Network intrusion detection signature activation(AzureDNS_SuspiciousDomain)Analysis of DNS transactions from %{CompromisedEntity} detected a known malicious network signature. Such activity, while possibly legitimate user behavior, is frequently an indication of the download or execution of malicious software. Typical related attacker activity is likely to include the download and execution of further malicious software or remote administration tools.Exfiltration-Azure DNSAzure Defender
325Possible data download via DNS tunnel(AzureDNS_DataInfiltration)Analysis of DNS transactions from %{CompromisedEntity} detected a possible DNS tunnel. Such activity, while possibly legitimate user behavior, is frequently performed by attackers to evade network monitoring and filtering. Typical related attacker activity is likely to include the download and execution of malicious software or remote administration tools.Exfiltration-Azure DNSAzure Defender
326Possible data exfiltration via DNS tunnel(AzureDNS_DataExfiltration)Analysis of DNS transactions from %{CompromisedEntity} detected a possible DNS tunnel. Such activity, while possibly legitimate user behavior, is frequently performed by attackers to evade network monitoring and filtering. Typical related attacker activity is likely to include the download and execution of malicious software or remote administration tools.Exfiltration-Azure DNSAzure Defender
327Possible data transfer via DNS tunnel(AzureDNS_DataObfuscation)Analysis of DNS transactions from %{CompromisedEntity} detected a possible DNS tunnel. Such activity, while possibly legitimate user behavior, is frequently performed by attackers to evade network monitoring and filtering. Typical related attacker activity is likely to include the download and execution of malicious software or remote administration tools.Exfiltration-Azure DNSAzure Defender
328Access from a suspicious IP address(Storage.Blob_SuspiciousIpStorage.Files_SuspiciousIp)Indicates that this storage account has been successfully accessed from an IP address that is considered suspicious. This alert is powered by Microsoft Threat Intelligence.Learn more about Microsoft's threat intelligence capabilities.Applies to: Azure Blob Storage, Azure Files, Azure Data Lake Storage Gen2Initial AccessMediumAzure StorageAzure Defender
329PREVIEW - Anonymous scan of public storage containers(Storage.Blob_ContainerAnonymousScan)A series of attempts were made to anonymously identify public containers in your storage account. This might indicate a reconnaissance attack, where the attacker scans your storage account to identify publicly accessible containers and then tries to find sensitive data inside them. Applies to: Azure Blob StoragePreAttack, CollectionMedium / HighAzure StorageAzure Defender
330PREVIEW – Phishing content hosted on a storage account(Storage.Blob_PhishingContentStorage.Files_PhishingContent)A URL used in a phishing attack points to your Azure Storage account. This URL was part of a phishing attack affecting users of Microsoft 365.Typically, content hosted on such pages is designed to trick visitors into entering their corporate credentials or financial information into a web form that looks legitimate.This alert is powered by Microsoft Threat Intelligence.Learn more about Microsoft's threat intelligence capabilities.Applies to: Azure Blob Storage, Azure FilesCollectionHighAzure StorageAzure Defender
331PREVIEW - Storage account identified as source for distribution of malware(Storage.Files_WidespreadeAm)Antimalware alerts indicate that an infected file(s) is stored in an Azure file share that is mounted to multiple VMs. If attackers gain access to a VM with a mounted Azure file share, they can use it to spread malware to other VMs that mount the same share.Applies to: Azure FilesLateral Movement, ExecutionHighAzure StorageAzure Defender
332PREVIEW - Storage account with potentially sensitive data has been detected with a publicly exposed container(Storage.Blob_OpenACL)The access policy of a container in your storage account was modified to allow anonymous access. This might lead to a data breach if the container holds any sensitive data. This alert is based on analysis of Azure activity log.Applies to: Azure Blob Storage, Azure Data Lake Storage Gen2Privilege EscalationMediumAzure StorageAzure Defender
333Access from a Tor exit node to a storage account(Storage.Blob_TorAnomalyStorage.Files_TorAnomaly)Indicates that this account has been accessed successfully from an IP address that is known as an active exit node of Tor (an anonymizing proxy). The severity of this alert considers the authentication type used (if any), and whether this is the first case of such access. Potential causes can be an attacker who has accessed your storage account by using Tor, or a legitimate user who has accessed your storage account by using Tor.Applies to: Azure Blob Storage, Azure Files, Azure Data Lake Storage Gen2Probing, ExploitationHighAzure StorageAzure Defender
334Access from an unusual location to a storage account(Storage.Blob_GeoAnomalyStorage.Files_GeoAnomaly)Indicates that there was a change in the access pattern to an Azure Storage account. Someone has accessed this account from an IP address considered unfamiliar when compared with recent activity. Either an attacker has gained access to the account, or a legitimate user has connected from a new or unusual geographic location. An example of the latter is remote maintenance from a new application or developer.Applies to: Azure Blob Storage, Azure Files, Azure Data Lake Storage Gen2ExploitationLowAzure StorageAzure Defender
335Anonymous access to a storage account(Storage.Blob_AnonymousAccessAnomaly)Indicates that there was a change in the access pattern to an Azure Storage account. Someone accessed a countainer in this storage account without authenticating. Access to this container is typically authenticated by SAS token, storage account key, or AAD. This might indicate that an attacker has exploited public read access to the storage account.Applies to: Azure Blob StorageExploitationHighAzure StorageAzure Defender
336Potential malware uploaded to a storage account(Storage.Blob_MalwareHashReputationStorage.Files_MalwareHashReputation)Indicates that a blob containing potential malware has been uploaded to a blob container or a file share in a storage account. This alert is based on hash reputation analysis leveraging the power of Microsoft threat intelligence, which includes hashes for viruses, trojans, spyware and ransomware. Potential causes may include an intentional malware upload by an attacker, or an unintentional upload of a potentially malicious blob by a legitimate user.Applies to: Azure Blob Storage, Azure Files (Only for transactions over REST API)Learn more about Azure's hash reputation analysis for malware.Learn more about Microsoft's threat intelligence capabilities.Lateral MovementHighAzure StorageAzure Defender
337Unusual access inspection in a storage account(Storage.Blob_AccessInspectionAnomalyStorage.Files_AccessInspectionAnomaly)Indicates that the access permissions of a storage account have been inspected in an unusual way, compared to recent activity on this account. A potential cause is that an attacker has performed reconnaissance for a future attack.Applies to: Azure Blob Storage, Azure FilesCollectionMediumAzure StorageAzure Defender
338Unusual amount of data extracted from a storage account(Storage.Blob_DataExfiltration.AmountOfDataAnomalyStorage.Blob_DataExfiltration.NumberOfBlobsAnomalyStorage.Files_DataExfiltration.AmountOfDataAnomalyStorage.Files_DataExfiltration.NumberOfFilesAnomaly)Indicates that an unusually large amount of data has been extracted compared to recent activity on this storage container. A potential cause is that an attacker has extracted a large amount of data from a container that holds blob storage.Applies to: Azure Blob Storage, Azure Files, Azure Data Lake Storage Gen2ExfiltrationMediumAzure StorageAzure Defender
339Unusual application accessed a storage account(Storage.Blob_ApplicationAnomalyStorage.Files_ApplicationAnomaly)Indicates that an unusual application has accessed this storage account. A potential cause is that an attacker has accessed your storage account by using a new application.Applies to: Azure Blob Storage, Azure FilesExploitationMediumAzure StorageAzure Defender
340Unusual change of access permissions in a storage account(Storage.Blob_PermissionsChangeAnomalyStorage.Files_PermissionsChangeAnomaly)Indicates that the access permissions of this storage container have been changed in an unusual way. A potential cause is that an attacker has changed container permissions to weaken its security posture or to gain persistence.Applies to: Azure Blob Storage, Azure Files, Azure Data Lake Storage Gen2PersistenceMediumAzure StorageAzure Defender
341Unusual data exploration in a storage account(Storage.Blob_DataExplorationAnomalyStorage.Files_DataExplorationAnomaly)Indicates that blobs or containers in a storage account have been enumerated in an abnormal way, compared to recent activity on this account. A potential cause is that an attacker has performed reconnaissance for a future attack.Applies to: Azure Blob Storage, Azure FilesCollectionMediumAzure StorageAzure Defender
342Unusual deletion in a storage account(Storage.Blob_DeletionAnomalyStorage.Files_DeletionAnomaly)Indicates that one or more unexpected delete operations has occurred in a storage account, compared to recent activity on this account. A potential cause is that an attacker has deleted data from your storage account.Applies to: Azure Blob Storage, Azure Files, Azure Data Lake Storage Gen2ExfiltrationMediumAzure StorageAzure Defender
343Unusual upload of .cspkg to a storage account(Storage.Blob_CspkgUploadAnomaly)Indicates that an Azure Cloud Services package (.cspkg file) has been uploaded to a storage account in an unusual way, compared to recent activity on this account. A potential cause is that an attacker has been preparing to deploy malicious code from your storage account to an Azure cloud service.Applies to: Azure Blob Storage, Azure Data Lake Storage Gen2Lateral Movement, ExecutionMediumAzure StorageAzure Defender
344Unusual upload of .exe to a storage account(Storage.Blob_ExeUploadAnomalyStorage.Files_ExeUploadAnomaly)Indicates that an .exe file has been uploaded to a storage account in an unusual way, compared to recent activity on this account. A potential cause is that an attacker has uploaded a malicious executable file to your storage account, or that a legitimate user has uploaded an executable file.Applies to: Azure Blob Storage, Azure Files, Azure Data Lake Storage Gen2Lateral Movement, ExecutionMediumAzure StorageAzure Defender
345PREVIEW - Access from an unusual location to a Cosmos DB accountIndicates that there was a change in the access pattern to an Azure Cosmos DB account. Someone has accessed this account from an unfamiliar IP address, compared to recent activity. Either an attacker has accessed the account, or a legitimate user has accessed it from a new and unusual geographical location. An example of the latter is remote maintenance from a new application or developer.ExploitationMediumAzure Cosmos DB (Preview)Azure Defender
346PREVIEW - Unusual amount of data extracted from a Cosmos DB accountIndicates that there was a change in the data extraction pattern from an Azure Cosmos DB account. Someone has extracted an unusual amount of data compared to recent activity. An attacker might have extracted a large amount of data from an Azure Cosmos DB database (for example, data exfiltration or leakage, or an unauthorized transfer of data). Or, a legitimate user or application might have extracted an unusual amount of data from a container (for example, for maintenance backup activity).ExfiltrationMediumAzure Cosmos DB (Preview)Azure Defender
347Network communication with a malicious machine detected(Network_CommunicationWithC2)Network traffic analysis indicates that your machine (IP %{Victim IP}) has communicated with what is possibly a Command and Control center. When the compromised resource is a load balancer or an application gateway, the suspected activity might indicate that one or more of the resources in the backend pool (of the load balancer or application gateway) has communicated with what is possibly a Command and Control center.Command and ControlMediumAzure Network LayerAzure Defender
348Possible compromised machine detected(Network_ResourceIpIndicatedAsMalicious)Threat intelligence indicates that your machine (at IP %{Machine IP}) may have been compromised by a malware of type Conficker. Conficker was a computer worm that targets the Microsoft Windows operating system and was first detected in November 2008. Conficker infected millions of computers including government, business and home computers in over 200 countries/regions, making it the largest known computer worm infection since the 2003 Welchia worm.Command and ControlMediumAzure Network LayerAzure Defender
349Possible incoming %{Service Name} brute force attempts detected(Generic_Incoming_BF_OneToOne)Network traffic analysis detected incoming %{Service Name} communication to %{Victim IP}, associated with your resource %{Compromised Host} from %{Attacker IP}. When the compromised resource is a load balancer or an application gateway, the suspected incoming traffic has been forwarded to one or more of the resources in the backend pool (of the load balancer or application gateway). Specifically, sampled network data shows suspicious activity between %{Start Time} and %{End Time} on port %{Victim Port}. This activity is consistent with brute force attempts against %{Service Name} servers.PreAttackMediumAzure Network LayerAzure Defender
350Possible incoming SQL brute force attempts detected(SQL_Incoming_BF_OneToOne)Network traffic analysis detected incoming SQL communication to %{Victim IP}, associated with your resource %{Compromised Host}, from %{Attacker IP}. When the compromised resource is a load balancer or an application gateway, the suspected incoming traffic has been forwarded to one or more of the resources in the backend pool (of the load balancer or application gateway). Specifically, sampled network data shows suspicious activity between %{Start Time} and %{End Time} on port %{Port Number} (%{SQL Service Type}). This activity is consistent with brute force attempts against SQL servers.PreAttackMediumAzure Network LayerAzure Defender
351Possible outgoing denial-of-service attack detected(DDOS)Network traffic analysis detected anomalous outgoing activity originating from %{Compromised Host}, a resource in your deployment. This activity may indicate that your resource was compromised and is now engaged in denial-of-service attacks against external endpoints. When the compromised resource is a load balancer or an application gateway, the suspected activity might indicate that one or more of the resources in the backend pool (of the load balancer or application gateway) was compromised. Based on the volume of connections, we believe that the following IPs are possibly the targets of the DOS attack: %{Possible Victims}. Note that it is possible that the communication to some of these IPs is legitimate.ImpactMediumAzure Network LayerAzure Defender
352Possible outgoing port scanning activity detected(PortSweeping)Network traffic analysis detected suspicious outgoing traffic from %{Compromised Host}. This traffic may be a result of a port scanning activity. When the compromised resource is a load balancer or an application gateway, the suspected outgoing traffic has been originated from to one or more of the resources in the backend pool (of the load balancer or application gateway). If this behavior is intentional, please note that performing port scanning is against Azure Terms of service. If this behavior is unintentional, it may mean your resource has been compromised.DiscoveryMediumAzure Network LayerAzure Defender
353Suspicious incoming RDP network activity from multiple sources(RDP_Incoming_BF_ManyToOne)Network traffic analysis detected anomalous incoming Remote Desktop Protocol (RDP) communication to %{Victim IP}, associated with your resource %{Compromised Host}, from multiple sources. When the compromised resource is a load balancer or an application gateway, the suspected incoming traffic has been forwarded to one or more of the resources in the backend pool (of the load balancer or application gateway). Specifically, sampled network data shows %{Number of Attacking IPs} unique IPs connecting to your resource, which is considered abnormal for this environment. This activity may indicate an attempt to brute force your RDP end point from multiple hosts (Botnet)PreAttackMediumAzure Network LayerAzure Defender
354Suspicious incoming RDP network activity(RDP_Incoming_BF_OneToOne)Network traffic analysis detected anomalous incoming Remote Desktop Protocol (RDP) communication to %{Victim IP}, associated with your resource %{Compromised Host}, from %{Attacker IP}. When the compromised resource is a load balancer or an application gateway, the suspected incoming traffic has been forwarded to one or more of the resources in the backend pool (of the load balancer or application gateway). Specifically, sampled network data shows %{Number of Connections} incoming connections to your resource, which is considered abnormal for this environment. This activity may indicate an attempt to brute force your RDP end pointPreAttackMediumAzure Network LayerAzure Defender
355Suspicious incoming SSH network activity from multiple sources(SSH_Incoming_BF_ManyToOne)Network traffic analysis detected anomalous incoming SSH communication to %{Victim IP}, associated with your resource %{Compromised Host}, from multiple sources. When the compromised resource is a load balancer or an application gateway, the suspected incoming traffic has been forwarded to one or more of the resources in the backend pool (of the load balancer or application gateway). Specifically, sampled network data shows %{Number of Attacking IPs} unique IPs connecting to your resource, which is considered abnormal for this environment. This activity may indicate an attempt to brute force your SSH end point from multiple hosts (Botnet)PreAttackMediumAzure Network LayerAzure Defender
356Suspicious incoming SSH network activity(SSH_Incoming_BF_OneToOne)Network traffic analysis detected anomalous incoming SSH communication to %{Victim IP}, associated with your resource %{Compromised Host}, from %{Attacker IP}. When the compromised resource is a load balancer or an application gateway, the suspected incoming traffic has been forwarded to one or more of the resources in the backend pool (of the load balancer or application gateway). Specifically, sampled network data shows %{Number of Connections} incoming connections to your resource, which is considered abnormal for this environment. This activity may indicate an attempt to brute force your SSH end pointPreAttackMediumAzure Network LayerAzure Defender
357Suspicious outgoing %{Attacked Protocol} traffic detected(PortScanning)Network traffic analysis detected suspicious outgoing traffic from %{Compromised Host} to destination port %{Most Common Port}. When the compromised resource is a load balancer or an application gateway, the suspected outgoing traffic has been originated from to one or more of the resources in the backend pool (of the load balancer or application gateway). This behavior may indicate that your resource is taking part in %{Attacked Protocol} brute force attempts or port sweeping attacks.DiscoveryMediumAzure Network LayerAzure Defender
358Suspicious outgoing RDP network activity to multiple destinations(RDP_Outgoing_BF_OneToMany)Network traffic analysis detected anomalous outgoing Remote Desktop Protocol (RDP) communication to multiple destinations originating from %{Compromised Host} (%{Attacker IP}), a resource in your deployment. When the compromised resource is a load balancer or an application gateway, the suspected outgoing traffic has been originated from to one or more of the resources in the backend pool (of the load balancer or application gateway). Specifically, sampled network data shows your machine connecting to %{Number of Attacked IPs} unique IPs, which is considered abnormal for this environment. This activity may indicate that your resource was compromised and is now used to brute force external RDP end points. Note that this type of activity could possibly cause your IP to be flagged as malicious by external entities.DiscoveryHighAzure Network LayerAzure Defender
359Suspicious outgoing RDP network activity(RDP_Outgoing_BF_OneToOne)Network traffic analysis detected anomalous outgoing Remote Desktop Protocol (RDP) communication to %{Victim IP} originating from %{Compromised Host} (%{Attacker IP}), a resource in your deployment. When the compromised resource is a load balancer or an application gateway, the suspected outgoing traffic has been originated from to one or more of the resources in the backend pool (of the load balancer or application gateway). Specifically, sampled network data shows %{Number of Connections} outgoing connections from your resource, which is considered abnormal for this environment. This activity may indicate that your machine was compromised and is now used to brute force external RDP end points. Note that this type of activity could possibly cause your IP to be flagged as malicious by external entities.Lateral MovementHighAzure Network LayerAzure Defender
360Suspicious outgoing SSH network activity to multiple destinations(SSH_Outgoing_BF_OneToMany)Network traffic analysis detected anomalous outgoing SSH communication to multiple destinations originating from %{Compromised Host} (%{Attacker IP}), a resource in your deployment. When the compromised resource is a load balancer or an application gateway, the suspected outgoing traffic has been originated from to one or more of the resources in the backend pool (of the load balancer or application gateway). Specifically, sampled network data shows your resource connecting to %{Number of Attacked IPs} unique IPs, which is considered abnormal for this environment. This activity may indicate that your resource was compromised and is now used to brute force external SSH end points. Note that this type of activity could possibly cause your IP to be flagged as malicious by external entities.DiscoveryMediumAzure Network LayerAzure Defender
361Suspicious outgoing SSH network activity(SSH_Outgoing_BF_OneToOne)Network traffic analysis detected anomalous outgoing SSH communication to %{Victim IP} originating from %{Compromised Host} (%{Attacker IP}), a resource in your deployment. When the compromised resource is a load balancer or an application gateway, the suspected outgoing traffic has been originated from to one or more of the resources in the backend pool (of the load balancer or application gateway). Specifically, sampled network data shows %{Number of Connections} outgoing connections from your resource, which is considered abnormal for this environment. This activity may indicate that your resource was compromised and is now used to brute force external SSH end points. Note that this type of activity could possibly cause your IP to be flagged as malicious by external entities.Lateral MovementMediumAzure Network LayerAzure Defender
362Traffic detected from IP addresses recommended for blockingAzure Security Center detected inbound traffic from IP addresses that are recommended to be blocked. This typically occurs when this IP address doesn't communicate regularly with this resource. Alternatively, the IP address has been flagged as malicious by Security Center's threat intelligence sources.ProbingLowAzure Network LayerAzure Defender
363Access from a suspicious IP address to a key vault(KV_SuspiciousIPAccess)A key vault has been successfully accessed by an IP that has been identified by Microsoft Threat Intelligence as a suspicious IP address. This may indicate that your infrastructure has been compromised. We recommend further investigation. Learn more about Microsoft's threat intelligence capabilities.Credential AccessMediumAzure Key VaultAzure Defender
364Access from a TOR exit node to a key vault(KV_TORAccess)A key vault has been accessed from a known TOR exit node. This could be an indication that a threat actor has accessed the key vault and is using the TOR network to hide their source location. We recommend further investigations.Credential AccessMediumAzure Key VaultAzure Defender
365High volume of operations in a key vault(KV_OperationVolumeAnomaly)An anomalous number of key vault operations were performed by a user, service principal, and/or a specific key vault. This anomalous activity pattern may be legitimate, but it could be an indication that a threat actor has gained access to the key vault and the secrets contained within it. We recommend further investigations.Credential AccessMediumAzure Key VaultAzure Defender
366Suspicious policy change and secret query in a key vault(KV_PutGetAnomaly)A user or service principal has performed an anomalous Vault Put policy change operation followed by one or more Secret Get operations. This pattern is not normally performed by the specified user or service principal. This may be legitimate activity, but it could be an indication that a threat actor has updated the key vault policy to access previously inaccessible secrets. We recommend further investigations.Credential AccessMediumAzure Key VaultAzure Defender
367Suspicious secret listing and query in a key vault(KV_ListGetAnomaly)A user or service principal has performed an anomalous Secret List operation followed by one or more Secret Get operations. This pattern is not normally performed by the specified user or service principal and is typically associated with secret dumping. This may be legitimate activity, but it could be an indication that a threat actor has gained access to the key vault and is trying to discover secrets that can be used to move laterally through your network and/or gain access to sensitive resources. We recommend further investigations.Credential AccessMediumAzure Key VaultAzure Defender
368Unusual application accessed a key vault(KV_AppAnomaly)A key vault has been accessed by a service principal that does not normally access it. This anomalous access pattern may be legitimate activity, but it could be an indication that a threat actor has gained access to the key vault in an attempt to access the secrets contained within it. We recommend further investigations.Credential AccessMediumAzure Key VaultAzure Defender
369Unusual operation pattern in a key vaultKV_OperationPatternAnomaly)An anomalous pattern of key vault operations was performed by a user, service principal, and/or a specific key vault. This anomalous activity pattern may be legitimate, but it could be an indication that a threat actor has gained access to the key vault and the secrets contained within it. We recommend further investigations.Credential AccessMediumAzure Key VaultAzure Defender
370Unusual user accessed a key vault(KV_UserAnomaly)A key vault has been accessed by a user that does not normally access it. This anomalous access pattern may be legitimate activity, but it could be an indication that a threat actor has gained access to the key vault in an attempt to access the secrets contained within it. We recommend further investigations.Credential AccessMediumAzure Key VaultAzure Defender
371Unusual user-application pair accessed a key vault(KV_UserAppAnomaly)A key vault has been accessed by a user-service principal pair that does not normally access it. This anomalous access pattern may be legitimate activity, but it could be an indication that a threat actor has gained access to the key vault in an attempt to access the secrets contained within it. We recommend further investigations.Credential AccessMediumAzure Key VaultAzure Defender
372User accessed high volume of key vaults(KV_AccountVolumeAnomaly)A user or service principal has accessed an anomalously high volume of key vaults. This anomalous access pattern may be legitimate activity, but it could be an indication that a threat actor has gained access to multiple key vaults in an attempt to access the secrets contained within them. We recommend further investigations.Credential AccessMediumAzure Key VaultAzure Defender
373DDoS Attack detected for Public IPDDoS Attack detected for Public IP (IP address) and being mitigated.ProbingHighAzure DDoS ProtectionAzure Defender
374DDoS Attack mitigated for Public IPDDoS Attack mitigated for Public IP (IP address).ProbingLowAzure DDoS ProtectionAzure Defender
375Security incident with shared process detectedThe incident which started on {Start Time (UTC)} and recently detected on {Detected Time (UTC)} indicates that an attacker has {Action taken} your resource {Host}-HighSecurity IncidentAzure Defender
376Security incident detected on multiple resourcesThe incident which started on {Start Time (UTC)} and recently detected on {Detected Time (UTC)} indicates that similar attack methods were performed on your cloud resources {Host}-MediumSecurity IncidentAzure Defender
377Security incident detected from same sourceThe incident which started on {Start Time (UTC)} and recently detected on {Detected Time (UTC)} indicates that an attacker has {Action taken} your resource {Host}-HighSecurity IncidentAzure Defender
378Security incident detected on multiple machinesThe incident which started on {Start Time (UTC)} and recently detected on {Detected Time (UTC)} indicates that an attacker has {Action taken} your resources {Host}-MediumSecurity IncidentAzure Defender
379Anonymous IP addressThis risk detection type indicates sign-ins from an anonymous IP address (for example, Tor browser or anonymous VPN). These IP addresses are typically used by actors who want to hide their login telemetry (IP address, location, device, etc.) for potentially malicious intent.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
380Atypical travelThis risk detection type identifies two sign-ins originating from geographically distant locations, where at least one of the locations may also be atypical for the user, given past behavior. Among several other factors, this machine learning algorithm takes into account the time between the two sign-ins and the time it would have taken for the user to travel from the first location to the second, indicating that a different user is using the same credentials. The algorithm ignores obvious "false positives" contributing to the impossible travel conditions, such as VPNs and locations regularly used by other users in the organization. The system has an initial learning period of the earliest of 14 days or 10 logins, during which it learns a new user's sign-in behavior.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
381Anomalous TokenThis detection indicates that there are abnormal characteristics in the token such as an unusual token lifetime or a token played from an unfamiliar location. This detection covers Session Tokens and Refresh Tokens.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
382Token Issuer AnomalyThis risk detection indicates the SAML token issuer for the associated SAML token is potentially compromised. The claims included in the token are unusual or match known attacker patterns.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
383Malware linked IP addressThis risk detection type indicates sign-ins from IP addresses infected with malware that is known to actively communicate with a bot server. This detection is determined by correlating IP addresses of the user's device against IP addresses that were in contact with a bot server while the bot server was active.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
384Suspicious browserSuspicious browser detection indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
385Unfamiliar sign-in propertiesThis risk detection type considers past sign-in history (IP, Latitude / Longitude and ASN) to look for anomalous sign-ins. The system stores information about previous locations used by a user, and considers these "familiar" locations. The risk detection is triggered when the sign-in occurs from a location that's not already in the list of familiar locations. Newly created users will be in "learning mode" for a period of time in which unfamiliar sign-in properties risk detections will be turned off while our algorithms learn the user's behavior. The learning mode duration is dynamic and depends on how much time it takes the algorithm to gather enough information about the user's sign-in patterns. The minimum duration is five days. A user can go back into learning mode after a long period of inactivity. The system also ignores sign-ins from familiar devices, and locations that are geographically close to a familiar location. We also run this detection for basic authentication (or legacy protocols). Because these protocols do not have modern properties such as client ID, there is limited telemetry to reduce false positives. We recommend our customers to move to modern authentication.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
386Admin confirmed user compromisedThis detection indicates an admin has selected 'Confirm user compromised' in the Risky users UI or using riskyUsers API. To see which admin has confirmed this user compromised, check the user's risk history (via UI or API).N.A.N.A.N.A.Azure Identity Protection Center (IPC)
387Malicious IP addressThis detection indicates sign-in from a malicious IP address. An IP address is considered malicious based on high failure rates because of invalid credentials received from the IP address or other IP reputation sources.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
388Suspicious inbox manipulation rulesThis detection is discovered by Microsoft Cloud App Security (MCAS). This detection profiles your environment and triggers alerts when suspicious rules that delete or move messages or folders are set on a user's inbox. This detection may indicate that the user's account is compromised, that messages are being intentionally hidden, and that the mailbox is being used to distribute spam or malware in your organization.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
389Password sprayA password spray attack is where multiple usernames are attacked using common passwords in a unified brute force manner to gain unauthorized access. This risk detection is triggered when a password spray attack has been performed.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
390Impossible travelThis detection is discovered by Microsoft Cloud App Security (MCAS). This detection identifies two user activities (is a single or multiple sessions) originating from geographically distant locations within a time period shorter than the time it would have taken the user to travel from the first location to the second, indicating that a different user is using the same credentials.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
391New countryThis detection is discovered by Microsoft Cloud App Security (MCAS). This detection considers past activity locations to determine new and infrequent locations. The anomaly detection engine stores information about previous locations used by users in the organization.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
392Activity from anonymous IP addressThis detection is discovered by Microsoft Cloud App Security (MCAS). This detection identifies that users were active from an IP address that has been identified as an anonymous proxy IP address.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
393Suspicious inbox forwardingThis detection is discovered by Microsoft Cloud App Security (MCAS). This detection looks for suspicious email forwarding rules, for example, if a user created an inbox rule that forwards a copy of all emails to an external address.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
394Azure AD threat intelligenceThis risk detection type indicates sign-in activity that is unusual for the given user or is consistent with known attack patterns based on Microsoft's internal and external threat intelligence sources.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
395Additional risk detectedThis detection indicates that one of the above premium detections was detected. Since the premium detections are visible only to Azure AD Premium P2 customers, they are titled "additional risk detected" for customers without Azure AD Premium P2 licenses.N.A.N.A.N.A.Azure Identity Protection Center (IPC)
396Account enumeration reconnaissanceN.A.DiscoveryMediumN.A.Microsoft Defender for Identity
397Active Directory attributes reconnaissance (LDAP)N.A.DiscoveryMediumN.A.Microsoft Defender for Identity
398Data exfiltration over SMBN.A.Exfiltration,Lateral movement,Command and controlHighN.A.Microsoft Defender for Identity
399Honeytoken activityN.A.Credential access,DiscoveryMediumN.A.Microsoft Defender for Identity
400Malicious request of Data Protection API master keyN.A.Credential accessHighN.A.Microsoft Defender for Identity
401Network mapping reconnaissance (DNS)N.A.DiscoveryMediumN.A.Microsoft Defender for Identity
402Remote code execution attemptN.A.Execution,Persistence,Privilege escalation,Defense evasion,Lateral movementMediumN.A.Microsoft Defender for Identity
403Remote code execution over DNSN.A.Privilege escalation,Lateral movementMediumN.A.Microsoft Defender for Identity
404Security principal reconnaissance (LDAP)N.A.Credential accessMediumN.A.Microsoft Defender for Identity
405Suspected Brute Force attack (Kerberos, NTLM)N.A.Credential accessMediumN.A.Microsoft Defender for Identity
406Suspected Brute Force attack (LDAP)N.A.Credential accessMediumN.A.Microsoft Defender for Identity
407Suspected Brute Force attack (SMB)N.A.Lateral movementMediumN.A.Microsoft Defender for Identity
408Suspected DCShadow attack (domain controller promotion)N.A.Defense evasionHighN.A.Microsoft Defender for Identity
409Suspected DCShadow attack (domain controller replication request)N.A.Defense evasionHighN.A.Microsoft Defender for Identity
410Suspected DCSync attack (replication of directory services)N.A.Persistence,Credential accessHighN.A.Microsoft Defender for Identity
411Suspected Golden Ticket usage (encryption downgrade)N.A.Privilege Escalation,Lateral movement,PersistenceMediumN.A.Microsoft Defender for Identity
412Suspected Golden Ticket usage (forged authorization data)N.A.Privilege escalation,Lateral movement,PersistenceHighN.A.Microsoft Defender for Identity
413Suspected Golden Ticket usage (nonexistent account)N.A.Privilege Escalation,Lateral movement,PersistenceHighN.A.Microsoft Defender for Identity
414Suspected Golden Ticket usage (ticket anomaly)N.A.Privilege Escalation,Lateral movement,PersistenceHighN.A.Microsoft Defender for Identity
415Suspected Golden Ticket usage (ticket anomaly using RBCD)N.A.PersistenceHighN.A.Microsoft Defender for Identity
416Suspected Golden Ticket usage (time anomaly)N.A.Privilege Escalation,Lateral movement,PersistenceHighN.A.Microsoft Defender for Identity
417Suspected identity theft (pass-the-hash)N.A.Lateral movementHighN.A.Microsoft Defender for Identity
418Suspected identity theft (pass-the-ticket)N.A.Lateral movementHigh or MediumN.A.Microsoft Defender for Identity
419Suspected Kerberos SPN exposure (external ID 2410)N.A.Credential accessHighN.A.Microsoft Defender for Identity
420Suspected Netlogon privilege elevation attempt (CVE-2020-1472 exploitation)N.A.Privilege EscalationHighN.A.Microsoft Defender for Identity
421Suspected NTLM authentication tamperingN.A.Privilege escalation, Lateral movementMediumN.A.Microsoft Defender for Identity
422Suspected NTLM relay attackN.A.Privilege escalation, Lateral movementMedium or Low if observed using signed NTLM v2 protocolN.A.Microsoft Defender for Identity
423Suspected overpass-the-hash attack (Kerberos)N.A.Lateral movementMediumN.A.Microsoft Defender for Identity
424Suspected rogue Kerberos certificate usageN.A.Lateral movementHighN.A.Microsoft Defender for Identity
425Suspected Skeleton Key attack (encryption downgrade)N.A.Lateral movement,PersistenceMediumN.A.Microsoft Defender for Identity
426Suspected SMB packet manipulation (CVE-2020-0796 exploitation) - (preview)N.A.Lateral movementHighN.A.Microsoft Defender for Identity
427Suspected use of Metasploit hacking frameworkN.A.Lateral movementMediumN.A.Microsoft Defender for Identity
428Suspected WannaCry ransomware attackN.A.Lateral movementMediumN.A.Microsoft Defender for Identity
429Suspicious additions to sensitive groupsN.A.Credential access,PersistenceMediumN.A.Microsoft Defender for Identity
430Suspicious communication over DNSN.A.ExfiltrationMediumN.A.Microsoft Defender for Identity
431Suspicious service creationN.A.Execution,Persistence,Privilege Escalation,Defense evasion,Lateral movementMediumN.A.Microsoft Defender for Identity
432Suspicious VPN connectionN.A.Persistence,Defense evasionMediumN.A.Microsoft Defender for Identity
433User and Group membershipreconnaissance (SAMR)N.A.DiscoveryMediumN.A.Microsoft Defender for Identity
434User and IP address reconnaissance (SMB)N.A.DiscoveryMediumN.A.Microsoft Defender for Identity
435Activity from anonymous IP addressN.A.InitialAccessN.A.N.A.Microsoft Cloud Application Security (MCAS)
436Activity from infrequent countryN.A.InitialAccessN.A.N.A.Microsoft Cloud Application Security (MCAS)
437Activity from suspicious IP addressesN.A.InitialAccessN.A.N.A.Microsoft Cloud Application Security (MCAS)
438Impossible TravelN.A.InitialAccessN.A.N.A.Microsoft Cloud Application Security (MCAS)
439Misleading OAuth app nameN.A.InitialAccessN.A.N.A.Microsoft Cloud Application Security (MCAS)
440Misleading publisher name for an OAuth appN.A.InitialAccessN.A.N.A.Microsoft Cloud Application Security (MCAS)
441Multiple storage deletion activitiesN.A.ExecutionN.A.N.A.Microsoft Cloud Application Security (MCAS)
442Multiple VM creation activitiesN.A.ExecutionN.A.N.A.Microsoft Cloud Application Security (MCAS)
443Suspicious creation activity for cloud region (preview)N.A.ExecutionN.A.N.A.Microsoft Cloud Application Security (MCAS)
444Activity performed by terminated userN.A.PersistenceN.A.N.A.Microsoft Cloud Application Security (MCAS)
445Suspicious change of CloudTrail logging serviceN.A.PersistenceN.A.N.A.Microsoft Cloud Application Security (MCAS)
446Suspicious email deletion activity (by user)N.A.PersistenceN.A.N.A.Microsoft Cloud Application Security (MCAS)
447Suspicious inbox manipulation ruleN.A.PersistenceN.A.N.A.Microsoft Cloud Application Security (MCAS)
448Unusual administrative activity (by user)N.A.PrivilegeEscalationN.A.N.A.Microsoft Cloud Application Security (MCAS)
449Multiple failed login attemptsN.A.CredentialAccessN.A.N.A.Microsoft Cloud Application Security (MCAS)
450Unusual addition of credentials to an OAuth appN.A.CollectionN.A.N.A.Microsoft Cloud Application Security (MCAS)
451Multiple Power BI report sharing activitiesN.A.CollectionN.A.N.A.Microsoft Cloud Application Security (MCAS)
452Suspicious Power BI report sharingN.A.CollectionN.A.N.A.Microsoft Cloud Application Security (MCAS)
453Unusual impersonated activity (by user)N.A.ExfiltrationN.A.N.A.Microsoft Cloud Application Security (MCAS)
454Suspicious inbox forwardingN.A.ExfiltrationN.A.N.A.Microsoft Cloud Application Security (MCAS)
455Unusual file download (by user)N.A.ExfiltrationN.A.N.A.Microsoft Cloud Application Security (MCAS)
456Unusual file access (by user)N.A.ImpactN.A.N.A.Microsoft Cloud Application Security (MCAS)
457Unusual file share activity (by user)N.A.ImpactN.A.N.A.Microsoft Cloud Application Security (MCAS)
458Multiple delete VM activitiesN.A.ImpactN.A.N.A.Microsoft Cloud Application Security (MCAS)
459Ransomware activityN.A.N.A.N.A.N.A.Microsoft Cloud Application Security (MCAS)
460Unusual file deletion activity (by user)N.A.N.A.N.A.N.A.Microsoft Cloud Application Security (MCAS)
461Investigation priority score increase (preview)N.A.N.A.N.A.N.A.Microsoft Cloud Application Security (MCAS)