Azure Automation Account Packages And Runtime Environments Backdoored 


Azure Automation is a service that automates processes across various cloud platforms, making it easier to manage complicated hybrid setups. 

It comes with a runtime environment that lets users set up the environment for running scripts and updates them to the most recent language versions.

EHA

Custom modules and packages can be specified to use in your runbooks through the “Automation Account service.” This feature can be compromised to allow an attacker persistent access to the Automation Account.  

Understanding Runtime Environments

Users can configure specific execution environments for Automation Account Runbooks using the Runtime Environments functionality.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration 

This enables users to set up particular packages that are suitable for use with an Automation Account container. An Automation Account now has more flexibility without causing package bloat on the base containers.

It is not possible to add more packages to the base “System-generated Runtime environments” in the new Runtime Environments system via the portal.

When you use the Runtime Environments feature, you can add packages that will be transferred to the new System-generated environments if you go back to the previous experience.  

Azure Automation Account Packages And Runtime Environments Backdoored 
 Runtime Environments feature

Once the feature becomes standard, it’s uncertain that you’ll be able to modify these base environments.

“If this does become the standard going forward, an attacker would need to create a new runtime, inject a malicious package into it, and swap the environment over for the target runbook. Alternatively, they could just create a new runbook and assign a new Runtime Environment to it”, reads the NetSPI blog.

A threat actor can use the package upload feature to add packages to the Automation Account. Once added, the malicious packages can be utilized in a runbook. 

Detecting Any Existing Malicious Packages In Your Automation Accounts

You can manually inspect your current modules and packages for any custom modules in the Azure portal to aid in the detection of any malicious packages that may already be present in your Automation Accounts. 

Azure Automation Account Packages And Runtime Environments Backdoored 
Review current modules and packages 

Experts believe it is realistic to expect a threat actor to try poisoning packages used by Automation Accounts, given previous supply chain attacks.

Although this persistence strategy has been discussed for a while, it is not currently in use in the wild.

Hence, this is a good chance to quickly review the packages in your Automation Accounts and determine whether anything unexpected is present in the containers.

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try It for Free



Source link