{"id":229,"date":"2024-02-01T07:54:14","date_gmt":"2024-02-01T06:54:14","guid":{"rendered":"https:\/\/www.ahehehinnou.fr\/M365SecurityCompliance\/?p=229"},"modified":"2024-02-01T07:54:14","modified_gmt":"2024-02-01T06:54:14","slug":"addressing-data-exfiltration-token-theft-talk","status":"publish","type":"post","link":"https:\/\/www.ahehehinnou.fr\/M365SecurityCompliance\/2024\/02\/01\/addressing-data-exfiltration-token-theft-talk\/","title":{"rendered":"Addressing Data Exfiltration: Token Theft Talk"},"content":{"rendered":"<p><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-entra-blog\/addressing-data-exfiltration-token-theft-talk\/ba-p\/3915337\">Addressing Data Exfiltration: Token Theft Talk &#8211; Microsoft Community Hub<\/a><\/p>\n<p>Stolen authentication artifacts \u2013 tokens and cookies \u2013 can be used to impersonate the victim and gain access to everything the victim had access to. Up until a few years ago, token theft was a rare attack and was most often exercised by corporate Red Teams. Why? Because it\u2019s simpler to steal a password than a cookie. However, with multifactor authentication (MFA) becoming more prevalent, we\u2019re seeing real-life attacks involving artifact theft and replay.<\/p>\n<p>&nbsp;<\/p>\n<p>Before diving into details, it\u2019s important to note that Microsoft recommends that the first line of defense against token theft is protecting your devices by deploying endpoint protections, device management, phishing-resistant MFA, and antimalware, as described in\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/11\/16\/token-tactics-how-to-prevent-detect-and-respond-to-cloud-token-theft\/\" target=\"_blank\" rel=\"noopener noreferrer\">Token tactics: How to prevent, detect, and respond to cloud token theft | Microsoft Security Blog<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>Now, let\u2019s discuss types of authentication artifacts and what techniques are recommended for each type to minimize the impact of theft. All authentication artifacts can be roughly divided into two buckets:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Sign-in session artifacts, maintain single sign-on (SSO) and app state between the client and Entra ID.<\/li>\n<li>Apps session artifacts, grant data access to client applications.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Addressing Data Exfiltration: Token Theft Talk &#8211; Microsoft Community Hub Stolen authentication artifacts \u2013 tokens and cookies \u2013 can be used to impersonate the victim and gain access to everything the victim had access to. Up until a few years ago, token theft was a rare attack and was most often exercised by corporate Red [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":230,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-229","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.ahehehinnou.fr\/M365SecurityCompliance\/wp-json\/wp\/v2\/posts\/229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ahehehinnou.fr\/M365SecurityCompliance\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ahehehinnou.fr\/M365SecurityCompliance\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ahehehinnou.fr\/M365SecurityCompliance\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ahehehinnou.fr\/M365SecurityCompliance\/wp-json\/wp\/v2\/comments?post=229"}],"version-history":[{"count":1,"href":"https:\/\/www.ahehehinnou.fr\/M365SecurityCompliance\/wp-json\/wp\/v2\/posts\/229\/revisions"}],"predecessor-version":[{"id":231,"href":"https:\/\/www.ahehehinnou.fr\/M365SecurityCompliance\/wp-json\/wp\/v2\/posts\/229\/revisions\/231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ahehehinnou.fr\/M365SecurityCompliance\/wp-json\/wp\/v2\/media\/230"}],"wp:attachment":[{"href":"https:\/\/www.ahehehinnou.fr\/M365SecurityCompliance\/wp-json\/wp\/v2\/media?parent=229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ahehehinnou.fr\/M365SecurityCompliance\/wp-json\/wp\/v2\/categories?post=229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ahehehinnou.fr\/M365SecurityCompliance\/wp-json\/wp\/v2\/tags?post=229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}