An emerging cybersecurity threat involves hackers exploiting Microsoft's Graph API to establish command-and-control (C&C) communications through Microsoft cloud services. The malware, named BirdyClient or OneDriveBirdyClient, was discovered by security analysts at Symantec. It targeted an organisation in Ukraine, using Microsoft OneDrive for C&C by connecting to the Graph API for file upload and download. This malware, along with others like Bluelight, Backdoor.Graphon, and Graphite, highlights a growing trend of threat actors leveraging trusted cloud services for malicious purposes, making detection challenging.
Key Events:
Analysis of the Attack:
The attack involves the utilisation of Microsoft's Graph API to establish C&C communications, primarily through Microsoft OneDrive. Malware like BirdyClient connects to the Graph API to upload and download files, allowing threat actors to control compromised systems remotely. By masquerading as legitimate software and leveraging trusted cloud services, attackers can evade detection and blend malicious activities with normal cloud traffic. This technique poses challenges for traditional detection methods as it utilises authorized API access channels for malicious purposes.
Lessons Learned:
Source and further reading.
Dutta, T. S., & Dutta, T. S. (2024, May 3). Hackers Exploit Microsoft Graph API For C&C Communications.
GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
https://gbhackers.com/hackers-exploit-microsoft-graph-api/amp/
The Hacker News. (n.d.-c).
Hackers increasingly abusing Microsoft Graph API for stealthy malware communications.
https://thehackernews.com/2024/05/hackers-increasingly-abusing-microsoft.html