Skip to content

Exfiltrate Azure Storage via public access

idempotent

Platform: Azure

Mappings

  • MITRE ATT&CK
    • Exfiltration

Description

Modify storage policies to download content in an Azure storage account.

Warm-up:

  • Create a storage account with anonymous blob access disabled
  • Create a storage container with an empty test file

Detonation:

  • Enable anonymous blob access on the storage account
  • Change storage container access level to allow public access (anonymous access to containers and blobs)
  • Download test file from the public container

References:

Instructions

Detonate with Stratus Red Team
stratus detonate azure.exfiltration.storage-public-access

Detection

Monitor Azure Activity Logs for storage account property changes, specifically Microsoft.Storage/storageAccounts/write operations that modify storage access policies.

Sample Azure Activity Log event to monitor:

    "operationName": {
        "value": "Microsoft.Storage/storageAccounts/write",
        "localizedValue": "Create/Update Storage Account"
    },
    "properties": {
        "requestbody": "{\"properties\":{\"allowBlobPublicAccess\":true}}",
        "eventCategory": "Administrative",
        "entity": "/subscriptions/[SUBSCRIPTION-ID]/resourceGroups/stratus-red-team-storage-storage-6m6k/providers/Microsoft.Storage/storageAccounts/stratusredteamstorage",
        "message": "Microsoft.Storage/storageAccounts/write",
        "hierarchy": "[REMOVED]"
    }