Azure TOR Activity

Azure TOR Activity

Detection overview

Triggers

  • Control plane activity was observed in patterns consistent with TOR usage.

Possible Root Causes

  • Unauthorized Access: An attacker is using TOR to access an Azure identity and execute Azure operations without permission.
  • Misconfigured Permissions: A user or service account has excessive permissions, allowing them to use TOR for malicious activities.
  • Malware or Vulnerability Exploitation: Malware or an exploited vulnerability in the VM�s operating system enables an attacker to access and utilize TOR from within the Azure environment.

Business Impact

  • Potential data breaches due to unauthorized access to sensitive information stored on Azure resources.
  • Compliance risks related to security regulations, such as GDPR, HIPAA, or PCI-DSS, if sensitive data is compromised.
  • Downtime and revenue loss due to the disruption of critical business services hosted on Azure.

Steps to Verify

  • Analyze Network Traffic: Use network monitoring tools and Azure logs to investigate source IP addresses connected to TOR nodes and verify their legitimacy.
  • Inspect Security Group Rules: Review NSG rules to ensure they are configured correctly and not inadvertently allowing TOR traffic.
  • Check for Malware or Vulnerabilities: Perform security reviews on affected Azure resources to identify potential entry points exploited by attackers to access the TOR network.
  • Review User Access and Permissions: Investigate user accounts with excessive permissions or unusual activity patterns, which may be linked to the observed TOR usage.
Azure TOR Activity

Possible root causes

Malicious Detection

Benign Detection

Azure TOR Activity

Example scenarios

Azure TOR Activity

Business impact

If this detection indicates a genuine threat, the organization faces significant risks:

Azure TOR Activity

Steps to investigate

Azure TOR Activity

MITRE ATT&CK techniques covered

Azure TOR Activity

Related detections

No items found.

FAQs