Skip to content

T1098.005 Device Registration

Adversaries may register a device to an adversary-controlled account. Devices may be registered in a multifactor authentication (MFA) system, which handles authentication to the network, or in a device management system, which handles device access and compliance.

MFA systems, such as Duo or Okta, allow users to associate devices with their accounts in order to complete MFA requirements. An adversary that compromises a user’s credentials may enroll a new device in order to bypass initial MFA requirements and gain persistent access to a network.16 In some cases, the MFA self-enrollment process may require only a username and password to enroll the account’s first device or to enroll a device to an inactive account. 2

Similarly, an adversary with existing access to a network may register a device to Azure AD and/or its device management system, Microsoft Intune, in order to access sensitive data or resources while bypassing conditional access policies.538

Devices registered in Azure AD may be able to conduct Internal Spearphishing campaigns via intra-organizational emails, which are less likely to be treated as suspicious by the email client.7 Additionally, an adversary may be able to perform a Service Exhaustion Flood on an Azure AD tenant by registering a large number of devices.4

Item Value
ID T1098.005
Sub-techniques T1098.001, T1098.002, T1098.003, T1098.004, T1098.005
Tactics TA0003
Platforms Azure AD, SaaS, Windows
Version 1.1
Created 04 March 2022
Last Modified 20 April 2023

Procedure Examples

ID Name Description
S0677 AADInternals AADInternals can register a device to Azure AD.9
G0016 APT29 APT29 has enrolled a device in MFA to an Azure AD environment following a successful password guessing attack against a dormant account.2
C0024 SolarWinds Compromise During the SolarWinds Compromise, APT29 registered devices in order to enable mailbox syncing via the Set-CASMailbox command.10

Mitigations

ID Mitigation Description
M1032 Multi-factor Authentication Require multi-factor authentication to register devices in Azure AD.7 Configure multi-factor authentication systems to disallow enrolling new devices for inactive accounts.1 When first enrolling MFA, use conditional access policies to restrict device enrollment to trusted locations or devices, and consider using temporary access passes as an initial MFA solution to enroll a device.2

Detection

ID Data Source Data Component
DS0026 Active Directory Active Directory Object Creation
DS0015 Application Log Application Log Content
DS0002 User Account User Account Modification

References


  1. Cybersecurity and Infrastructure Security Agency. (2022, March 15). Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability. Retrieved March 16, 2022. 

  2. Douglas Bienstock. (2022, August 18). You Can’t Audit Me: APT29 Continues Targeting Microsoft 365. Retrieved February 23, 2023. 

  3. Dr. Nestori Syynimaa. (2020, September 6). Bypassing conditional access by faking device compliance. Retrieved March 4, 2022. 

  4. Dr. Nestori Syynimaa. (2021, January 31). BPRT unleashed: Joining multiple devices to Azure AD and Intune. Retrieved March 4, 2022. 

  5. Dr. Nestori Syynimaa. (2021, March 3). Deep-dive to Azure AD device join. Retrieved March 9, 2022. 

  6. Kelly Jackson Higgins. (2021, January 7). FireEye’s Mandia: ‘Severity-Zero Alert’ Led to Discovery of SolarWinds Attack. Retrieved April 18, 2022. 

  7. Microsoft 365 Defender Threat Intelligence Team. (2022, January 26). Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA. Retrieved March 4, 2022. 

  8. Microsoft. (2022, March 22). DEV-0537 criminal actor targeting organizations for data exfiltration and destruction. Retrieved March 23, 2022. 

  9. Dr. Nestori Syynimaa. (2018, October 25). AADInternals. Retrieved February 18, 2022. 

  10. Cash, D. et al. (2020, December 14). Dark Halo Leverages SolarWinds Compromise to Breach Organizations. Retrieved December 29, 2020. 

  11. Microsoft. (2022, February 18). Manage device identities by using the Azure portal. Retrieved April 13, 2022. 

  12. Microsoft. (2020, September 16). Azure Active Directory security operations for devices. Retrieved February 21, 2023.