Security News > 2023 > March > New CISA tool detects hacking activity in Microsoft cloud services

New CISA tool detects hacking activity in Microsoft cloud services
2023-03-23 18:34

The U.S. Cybersecurity & Infrastructure Security Agency has released a new open-source incident response tool that helps detect signs of malicious activity in Microsoft cloud environments.

Known as the 'Untitled Goose Tool' and developed in collaboration with Sandia, a U.S. Department of Energy national laboratory, this Python-based utility can dump telemetry information from Azure Active Directory, Microsoft Azure, and Microsoft 365 environments.

"Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer's Azure Active Directory, Azure, and M365 environments," CISA says.

"Untitled Goose Tool gathers additional telemetry from Microsoft Defender for Endpoint and Defender for Internet of Things."

Export and review AAD sign-in and audit logs, M365 unified audit log, Azure activity logs, Microsoft Defender for IoT alerts, and Microsoft Defender for Endpoint data for suspicious activity.

The cybersecurity agency previously released in June 2021 a new module for its Cyber Security Evaluation Tool known as Ransomware Readiness Assessment to help organizations assess their readiness to prevent and recover from ransomware attacks.


News URL

https://www.bleepingcomputer.com/news/security/new-cisa-tool-detects-hacking-activity-in-microsoft-cloud-services/

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Microsoft 365 50 1369 2819 161 4399