Podcast
Root Causes 323: Update on Microsoft Key Compromise


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
August 3, 2023
In this follow up to our episode 320, we describe Microsoft's actions to mitigate this attack and explain new understanding that shows its impact to be broader than originally thought. Anyone using the Microsoft stack needs to understand this new threat.
Podcast Transcript
Lightly edited for flow and brevity.
These tokens, they're not really valid. You can't just make them up. They have to be signed by this Microsoft signing key, which unfortunately was compromised. So think about this. Let's say that you have a lock on your front door and this door uses like a pin pad and you have to enter in a complicated in order to open the door. It’s not like a key, like the way we traditionally think of a key. Think of the key in this case as being the thing that bestows the pin pad, the actual number on the pin pad to be the something that is known to be valid by the pin pad reader. It's kind of a complicated way of saying it. What I'm really trying to say here is that the actual login mechanism of OpenID depends on trust to be bestowed on it, if you will, by a signing key. That's what I'm trying to get across here.
The problem is this. this is the reason why we wanted to call out this on the podcast, is because a lot of you probably don't have certain logs turned on in order to look for this forged token usage and the indicators of compromise. It's very specific of the forged token usage that the logs might not be turned on. So without getting into a lot of that application specific logging stuff and how that would all work, this is not an IT course we're putting on here on this podcast, this is something where if you're a Risk Officer, if you're a CIO, please ask your security staff and your IT staff that are responsible for turning on or off these logs to determine whether or not you do have those logs on and look for that indicator of forged token usage and all those other indicators of compromise, IOCs, make sure that you're the what's necessary to look for those forge token usages is available to you. That's the most plain English I can put it.
Microsoft blocked the usage of tokens signed by the acquired MSA key in OWA, preventing further threat actor and apprised mail activity. So we get that.
Second one. Microsoft completed the replacement of the key to prevent the threat actor from using it to forge tokens. In other words, we replaced it. We revoked the cert. This is what you and I were talking about.
Here's the third one. Microsoft blocked usage of tokens issued with the key for all impacted consumer customers. So what's the significance of that third one? And is that solving the problem for us?
They were paying very close attention to things and realized, oh, this goes beyond the scope of Outlook and OWA. This goes into other things as well. Therefore, what Wiz is suggesting is, has Microsoft turned off token usage for those apps? Well, maybe what you should really be doing right now is looking for indicators of that. Looking for usage of those forged tokens and other IOCs that you can look up another logs. That's what they’re saying.

