Joyce Teo

From Blind Spots to Breakthroughs: How APAC Organisations Can Build Cloud Resilience in 2025

Cloud adoption in Asia-Pacific (APAC) is no longer up for debate. The question isn’t if organisations are moving to the cloud, but how fast. Hybrid cloud is already the dominant model (73%), and SaaS platforms like Microsoft 365 (68%), Google Workspace (47%), and Salesforce (33%) are firmly embedded in daily operations.

As cloud adoption accelerates, so do the risks. The Security Challenges for Cloud Adoption in APAC 2025 report reveals that 35% of organisations suffered a data breach in just the last six months, while 72% admit their security tools still have blind spots. Only a third of security professionals (34%) feel “very confident” about their organisation’s cloud security posture.

Cloud is inevitable — but cloud resilience is the missing link. The challenge for many APAC organisations is shifting from fragmented defences and hidden risks to a state of robust, proactive cloud resilience. This post explores how to close the gaps, adopt best practices, and transform blind spots into breakthroughs.

The Gaps Holding Organisations Back

The survey highlights three key obstacles undermining cloud security across APAC:

  • Blind spots in visibility (72%): Despite heavy investments, most organisations still can’t see everything happening in their cloud environments. This creates dangerous gaps where threats can hide.
  • Compliance challenges (80%): Meeting regulatory requirements remains the top concern. With data dispersed across multiple clouds and SaaS platforms, aligning with data privacy laws and industry standards is complex and costly.
  • Skills shortage (58%): More than half of organisations lack trained staff to manage cloud security effectively. This gap contributes to shadow IT usage (62%) and accidental data exposure (60%) by employees.

Together, these challenges create an environment where both technical vulnerabilities and human error amplify the risk of breaches.

A Phased, Risk-Based Security Strategy

One of the strongest recommendations from the report is to avoid trying to “secure everything at once.” Cloud environments span SaaS, IaaS, and PaaS — tackling all of them simultaneously overwhelms security teams and leads to missteps.

Instead, organisations should adopt a phased, risk-based approach:

  1. Start with the highest-risk platforms. Begin with widely used SaaS applications like Microsoft 365, which are both heavily targeted and business-critical.
  2. Roll out in stages. Focus on one platform, achieve measurable improvements, and then expand coverage to other services.
  3. Align security with operational maturity. Early stages should deliver quick wins — such as detecting hijacked accounts or preventing data leakage — before scaling to more advanced workloads.

This staged approach helps organisations strengthen resilience step by step while ensuring each investment delivers tangible value.

SaaS Security: The New Frontline

The report shows clearly that SaaS is the frontline of cloud security in APAC. With Microsoft 365 and Google Workspace at the heart of most businesses, they have become the most common entry points for attackers.

Top SaaS concerns identified include:

  • Hijacked accounts (72%): Credential theft and phishing continue to plague organisations, enabling attackers to impersonate employees and steal data.
  • Misconfigurations (66%): Poorly configured file-sharing policies or permissions expose sensitive documents.
  • Accidental leaks (62%): Employees unintentionally share confidential data externally, often without realising the risks.

To address these issues, organisations must make SaaS-specific security a priority, with stronger identity and access controls, continuous monitoring of file sharing, and regular audits of third-party app permissions.

Simplifying Security for Lean Teams

The skills gap across APAC is real. With 58% of organisations lacking trained staff, it’s not realistic to expect small or overstretched teams to manage complex, resource-heavy security solutions.

The path forward is to simplify security operations:

  1. Adopt tools that automate repetitive tasks such as misconfiguration checks.
  2. Use dashboards that make alerts easy to understand and act on.
  3. Focus on reducing false positives so teams can spend time on real threats.

Simplification doesn’t mean reducing coverage — it means making security achievable for lean teams without requiring an army of specialists.

Automating Security with AI and Continuous Monitoring

Misconfigurations remain one of the biggest risks, with 53% of organisations reporting them as a concern. Yet, only 9% perform continuous monitoring, while the majority check monthly or even less frequently. This creates dangerous windows of vulnerability, sometimes leaving organisations exposed for more than a month.

AI and automation are game changers here. By using AI-driven monitoring and remediation, organisations can:

  • Detect suspicious account activity or abnormal data access in real time.
  • Identify and resolve misconfigurations quickly, before attackers exploit them.
  • Apply User and Entity Behaviour Analytics (UEBA) to spot insider threats or compromised accounts.

Automated systems cut down the lag between detection and response, transforming security from reactive firefighting to proactive resilience.

Bridging the Skills Gap

The shortage of cloud security talent in APAC is one of the region’s most pressing challenges. According to the report, 58% of organisations lack the staff to manage cloud security effectively. Without intervention, this gap will only widen as adoption continues.

Bridging the gap requires a two-track strategy:

  • Invest in training and upskilling. Provide certifications, hands-on labs, and continuous learning opportunities for IT staff.
  • Adopt user-friendly tools. The less time teams spend wrestling with complicated interfaces or unnecessary alerts, the more they can focus on high-value work.

For some organisations, managed security services can also provide immediate support while internal capabilities are developed.

Building Cloud Resilience in 2025

The findings in the report reveal that organisations in APAC are already preparing for the next stage of cloud security. Nearly 80% plan to increase their adoption of cloud security tools, and 32% will invest between USD $100,000 and $500,000, while 10% will invest more than $1 million in the next three years.

This level of commitment reflects both urgency and opportunity. Organisations that embrace best practices now can reduce their breach exposure, strengthen compliance, and build trust with customers and partners.

The pathway to cloud resilience is clear:

  • Close blind spots with continuous visibility.
  • Adopt phased, risk-based strategies.
  • Prioritise SaaS as the frontline.
  • Automate misconfiguration detection and response.
  • Empower lean teams with simpler tools and training.

Cloud adoption is non-negotiable. But cloud resilience is a strategic choice — one that can define whether organisations merely survive or truly thrive in 2025 and beyond.

Download the Full Report

This blog draws on key insights from the Security Challenges for Cloud Adoption in APAC 2025 report, which examines regional security gaps, SaaS risks, and best practices for building resilience. To explore the complete findings and recommendations, download the full report here.

EchoLeak: Zero-Click Data Exfiltration Vulnerability in M365 Copilot

Background of M365 Copilot

What is a Retrieval Augmented Generation (RAG)?

Retrieval Augmented Generation (RAG) is a technique that improves the responses of LLMs by connecting external data sources. The connection to relevant data sources allows responses to be more accurate and contextually relevant by reducing hallucinations and generic responses.

M365 Copilot and RAG Intergration

M365 Copilot is a RAG-based chatbot that queries the Microsoft Graph and retrieves any relevant information from the user’s organisational environment, including mailboxes, OneDrive storage, Microsoft 365 Office files, internal SharePoint sites, and Microsoft Teams chat history. Copilot’s permission model ensures that the user only has access to their own files which may include sensitive, proprietary and compliance-related information. M365 Copilot integration with Microsoft Graph potentially exposes it to threats originating from outside the organisation.  

Attack Background

The attack discussed uses the number one exploit in OWASP Top 10 list known as Prompt Injection. Prompt Injection occurs when an attacker or user prompts alter the LLMs’ behaviour or output in an unintended way. These inputs can affect the model even if they are imperceptible to humans; therefore prompt injections do not need to be visible or readable to humans, if the content is parsed by the model.

Prompt injection involves manipulating model responses through specific inputs to alter its behaviour, which can include bypassing safety measures. Prompt Injection vulnerabilities exist due to how models process prompts, and how input may force the model to incorrectly pass prompt data to other parts of the model, potentially causing malicious output.

The prompt injection used in this attack can be classified as “Indirect Prompt Injection”. Indirect prompt injections occur when an LLM accepts input from external sources and the content when interpreted by the model, maliciously alters the model’s behaviour.

In addition, Aim Labs has classified the attack as “LLM Scope Violation. The term describes the situation where an attacker’s input manipulates the LLM to access trusted data in the model’s context without user interaction.

The attack relies on Copilot’s default behaviour to combine and process content from Outlook and SharePoint thereby turning trust into a silent data leak vector.

Attack Diagram

Attack Flow Breakdown

  1. XPIA bypass via crafted email

Attackers are able to bypass the XPIA (cross-prompt injection attack) classifiers by phrasing the email that contained malicious instructions as if the instructions were aimed at the recipient. The attackers are careful not to  mention AI/assistants/Copilot to make sure that the XPIA classifiers don’t detect the email as malicious.

  • User initiates attacks

User asks Microsoft 365 Copilot a business-related or research question that triggers Copilot to access Outlook and other connected Microsoft applications for context. This action leads to Copilot ingesting the crafted email sent by the attacker.

  • Scope Violation through Redaction Bypass
    • Link redaction bypass

By default, Copilot redacts external markdown links from the chat history before the user has any chance of clicking those links. This solution should enforce that only safe link targets (i.e., internal webpages) are presented as clickable links to the user. But we are able to bypass this restriction by using Reference-style markdown links as they are not redacted and are not recognised by Microsoft.

Below are examples of links not removed from the chat by M365 Copilot:

  • Image redaction bypass

To ensure the link is clicked without user interaction, the attacker can trick the LLM into outputting a markdown image with an embedded image. When the link is embedded, the browser automatically accesses the links allowing the attacker to exfiltrate data.

The markdown image format also includes Reference-style links that are able to bypass Copilot’s link redaction. Here the examples of links not removed from the chat by M365 Copilot:

  • Data Exfiltration through SharePoint and Teams

Even while using Reference-style markdown link, the attacker is not able to use custom domain to exfiltrate data as Microsoft has Content-Security-Policy whitelisting in-place to deter such attacks. Here is the list of domains whitelisted by Microsoft:

But the attacker is able to bypass the CSP through these whitelisted domains. Among the list of domains are “*[.]sharepoint[.]com” which can be exploited to craft a malicious invite URL:

This crafted link allows the attacker to request on behalf of the client to fetch embedded data for the SPO site, but this flow requires the victim to accept the invitation from the attacker to allow data exfiltration.

To achieve a zero-click vulnerability, the attacker instead uses Microsoft Teams “*[.]teams[.]com” to craft better malicious link which does not require user interaction:

MITRE Mapping

Mapping based on MITRE ATT&CK and ATLAS.

Recommended Remediation

Implement a robust monitoring strategy across all M365 environments, including anomalous access and exfiltration data that may indicate malicious activity.

M365 environment administrators should enforce proper logging and access management for users to prevent further unauthorised access.  Moreover, users should monitor user activity in their tenant to ensure activities performed are not due to AI agents or attackers.

In addition, the deployment of automated alerts and remediation workflows is essential for reducing response times and minimising the overall impact of an attack. By integrating automated detection systems with remediation protocols, organisations can ensure that security teams are alerted in real time, enabling them to take swift, targeted actions. This not only improves operational efficiency but also ensures that security breaches are mitigated with minimal delay. It is imperative that these processes be continuously reviewed and updated to address evolving threat tactics and maintain a high level of protection for M365 environments. 

Implementation of an automated response and alert system can be done through InsiderSecurity’s CSX.  

Conclusion

Aim Labs has discovered a critical zero-click AI vulnerability named EchoLeak that leverages Microsoft 365 Copilot, which enables attackers to exfiltrate sensitive data with zero user interaction. The exploit uses a novel technique introduced as “LLM Scope Violation”. This technique manipulates Copilot which uses retrieval-augmented generation (RAG) by sending an email with embedded prompt injection. Although no known customer impact has occurred yet, this vulnerability expands to all known LLM models that have RAG or connected to data sources. These vulnerabilities indicate a growing security threat that can be exploited by novice attackers due to a lack of proper scope control and security measures in place.

Microsoft Power Pages: Data Exposure Risks and Mitigation Strategies 

What is Microsoft Power Pages?

Microsoft Power Pages, a low-code SaaS platform, enables organisations to swiftly develop external-facing websites. While it offers convenience and efficiency, recent findings have highlighted significant data exposure risks stemming from misconfigured access controls. These misconfigurations can inadvertently expose sensitive information to unauthorised users, underscoring the critical need for robust security practices. 

Common Use Cases for Microsoft Power Pages 

Organisations across various sectors leverage Microsoft Power Pages for numerous applications, including: 

  • Customer Service Portal – Self-service platform for customer inquiries and support 
  • Employee Onboarding – Streamlined processes for new hire documentation and training 
  • Event Registration Platform – Automated registration and management systems 
  • Vendor Management System – Centralised vendor information and relationship management 
  • Community Forum – Interactive platforms for user engagement and discussion 
  • Knowledge Bases – Centralised repositories for organisational information 
  • Appointment Scheduling Site – Automated booking and calendar management 
  • E-learning Portal – Educational content delivery and training platforms 
  • Patient Portal – Healthcare information access and appointment management 
  • Incident Reporting System – Streamlined reporting and tracking of organisational incidents 

How Did This Happen? 

A cybersecurity researcher discovered substantial data exposures in Microsoft Power Pages websites due to misconfigured access controls. These vulnerabilities resulted in the public exposure of sensitive data, including Personally Identifiable Information (PII) such as full names, email addresses, phone numbers, and home addresses.  

Most notably, a large, shared business service provider for the UK’s National Health Service (NHS) inadvertently leaked information about over 1.1 million NHS employees, encompassing email addresses, telephone numbers, and home addresses. This specific issue was caused specifically due to misconfiguration of power apps. 

Severity of the Breach 

The misconfigurations identified have led to the exposure of millions of sensitive records across various sectors, including technology, healthcare, and finance. The NHS incident alone affected over a million employees, highlighting the extensive impact such vulnerabilities can have on both individuals and organisations. The exposed data, accessible to unauthorised users, poses significant risks, including identity theft, phishing attacks, and other malicious activities. 

Impact on Affected Organisations 

The data exposure has far-reaching implications for the organisations involved. Beyond the immediate risk of data theft, companies may face legal repercussions, regulatory fines, and damage to their reputations. Customers whose data has been compromised are at increased risk of identity theft, financial fraud, and other malicious activities. 

For businesses, this incident underscores the importance of thoroughly understanding and correctly configuring security settings in all platforms they use. Relying on default settings without a comprehensive security review can lead to vulnerabilities that are easily exploitable. 

Causes of Data Exposure 

The primary cause of these data exposures is the misconfiguration of access controls within Power Pages. Key factors contributing to the breach include: 

  • Enabling Open Self-Registration: By default, newly deployed Power Pages sites permit anonymous users to register and obtain “Authenticated” status, which generally comes with expanded permissions. Even if registration pages are not explicitly displayed on the site, users can still sign up and authenticate through associated APIs. 
  • Assigning “Global Access” Permissions to External Users: Granting “Global Access” to tables for anonymous users makes all records within those tables publicly accessible. Similarly, if authenticated users are assigned this permission and self-registration is open, unauthorised individuals could exploit it to gain unrestricted data access.  
  • Lack of Column-Level Security for Sensitive Data: Even when table-level access controls are in place, attackers may still access unprotected columns if column-level security is not applied. This inconsistency in security implementation, often due to the complexity of the setup process or a lack of awareness, leaves certain data vulnerable to exposure.   
  • Failure to Mask Sensitive Data: Instead of using column-level security, organisations can apply data masking techniques to obfuscate sensitive information. However, many fail to implement this, leaving confidential data readable by unauthorised users. 
  •  Overexposing Data via the Power Pages Web API: Organisations frequently configure the Web API to expose all columns of a table, rather than limiting access to only necessary fields. This practice increases the risk of data leaks, as unauthorised individuals gaining access to the API could retrieve excessive amounts of sensitive information. 

How to Detect Misconfigurations in Microsoft Power Pages 

Detecting such misconfigurations requires a comprehensive review of access control settings within Power Pages deployments. Organisations should: 

  • Audit Site-Level Settings: Ensure that authentication and registration configurations align with security policies, disabling open registrations if not necessary. 
  • Review Table and Record Permissions: Verify that permissions granted to roles, especially ‘Anonymous Users’ and ‘Authenticated Users,’ are appropriate and do not provide excessive access. 
  • Implement Column-Level Security: Utilise column security profiles and data masking to protect sensitive information from unauthorised access. 
  • Continuous Monitoring: Regularly monitor and assess configurations to detect and remediate any deviations from established security baselines. 

Conclusion

The incidents of data exposure in Microsoft Power Pages serve as a stark reminder of how easily misconfigurations can compromise sensitive information on a massive scale. While the platform offers immense value across industries—from healthcare and finance to education and community services—the responsibility of securing these deployments ultimately lies with the organisations that use them.

By proactively auditing configurations, applying granular access controls, and implementing continuous monitoring, organisations can mitigate risks and safeguard the sensitive data entrusted to them. The lesson is clear: security cannot be treated as an afterthought. In today’s threat landscape, robust configuration and vigilant oversight are not optional—they are essential to protecting both people and businesses from preventable breaches.

APT29 Phishing Attacks via Microsoft Teams: Tactics, Techniques, and Prevention

Overview of the Threat Actor: APT29 (Midnight Blizzard)

APT29, also known as Midnight Blizzard, NOBELIUM, UNC2452, or Cozy Bear, is a highly sophisticated Russia-based threat actor attributed by the US and UK governments as the Foreign Intelligence Service of the Russian Federation (SVR). Midnight Blizzard (NOBELIUM) primarily targets governments, diplomatic entities, NGOs, and IT service providers in primarily the US and Europe. Their primary objective is to collect and exfiltrate intelligence through espionage of foreign interests and government. They utilise diverse initial access methods ranging from stolen credentials, domain takeover, phishing and exploitation of on-premises environments to laterally move to the cloud exploiting service providers’ trust chain to gain access to downstream customers.

How does APT29 use Microsoft Teams for phishing campaigns?

Step 1: Compromising and spoofing tenant domains

Midnight Blizzard begins operations by conducting password spray attacks that successfully breached an outdated, non-production test tenant account lacking multifactor authentication (MFA) or purchasing abandoned corporate domains on dark web markets. Furthermore, the threat actor increased stealth by routing their activity through a distributed residential proxy network. These tactics helped conceal their actions and allowed them to maintain the attack over time until they achieved access.

Between 2023-2025, the group systematically:

  • Renamed compromised tenants to mimic trusted entities (e.g., “Contoso IT Support”)
  • Created. onmicrosoft[.]com” subdomains likesupport-contoso[.]onmicrosoft.com”to bypass domain reputation checks
  • Registered lookalike domains such as “microsoft-support[.]tech” with valid TLS certificates to host phishing pages

This infrastructure spoofing enabled the threat actor to send Teams messages appearing as internal notifications, with most of the targets perceiving them as legitimate due to Microsoft-branded headers.

Step 2: Social Engineering

During this step, Midnight Blizzard either has obtained valid account credentials for the users they are targeting, or they are targeting users with passwordless authentication configured on their account; both of which require the user to enter a code that is displayed during the authentication flow into the prompt on the Microsoft Authenticator app on their mobile device.

  1. Teams request to chat

The target receives a Microsoft Teams message request as a member of the security team or technical support team.

  1. Request authentication app action

Once the victim accepts the message request, the threat actor convinces the victim to input a code into their Microsoft Authenticator app.

  1. Successful MFA authentication

Once the user complies with the threat actor’s instructions, the threat actor gains the token to authenticate as the victim. This allows the threat actor to gain access to the victim’s M365 account. The threat actor then follows up with their post-compromise exploitation.

Step 3: Post-Compromise Exploitations

The threat actor then proceeds with post-compromise activity, which typically involves information theft from the compromised Microsoft 365 tenant.  

  1. Malicious use of OAuth applications

Once the threat actor gains access to the targeted tenant as the victim, they create, modify, and grant high permissions to OAuth applications that they can misuse to hide malicious activity. The misuse of OAuth also enables threat actors to maintain access to applications, even if they lose access to the initially compromised account. Midnight Blizzard leveraged their initial access to identify and compromise any legacy test OAuth application that had elevated access to the Microsoft corporate environment. The threat actor creates additional malicious OAuth applications. In certain scenarios, the threat actor used the legacy test OAuth application to grant them the Office 365 Exchange Online “full_access_as_app” role, which allows access to mailboxes to gain access to tenant users and perform exfiltration and phishing.

Moreover, Midnight Blizzard has also been known to abuse OAuth applications in past attacks against other organisations using the “EWS.AccessAsUser.All” Microsoft Graph API role or the Exchange Online “ApplicationImpersonation” role to enable access to email.

For a deeper technical breakdown of how APT29 exploits cloud-native services and OAuth abuse in Microsoft 365, see our detailed analysis: APT29 in the Cloud – A Comprehensive Analysis of Threats and Detection Strategies.

  1. Adding Malicious Devices to Compromised Tenant

In other instances, Midnight Blizzard attempts to register a device with the organisation’s Microsoft Entra ID (formerly Azure Active Directory) in an effort to enrol it as a managed or compliant device. This tactic is designed to bypass Conditional Access policies that restrict access to sensitive resources such as email, SharePoint, or Teams to only devices that are marked as compliant or hybrid Azure AD-joined. By registering their own infrastructure as a managed device, the actor seeks to meet these conditional access requirements without raising immediate suspicion. When abused by a threat actor, it allows malicious endpoints to masquerade as trusted devices, thereby evading key security controls designed to prevent unauthorised access.

In newer campaigns, Volexity published a blog post on Russia-linked threat actors, tracked as UTA0352 and UTA035 conducting similar phishing campaigns abusing Microsoft OAuth 2.0 to target entities with ties to Ukraine.

Compared to Midnight Blizzard campaigns, the resource requested is for the Device Registration Service. This service is used by Windows to join new devices to Entra ID. The attacker uses this access to enrol a new device to the victim’s Entra ID. Using the ROADTools project, Volexity is able to replicate these steps to create a new token with full permissions for Microsoft Graph API access. This technique leverages a flaw in the Entra ID API design to grant an access token with a greater level of access than initially granted.

In one observed interaction, UTA0355 requested that the victim approve a two-factor authentication (2FA) prompt under the guise of accessing a SharePoint site tied to a conference. This step was critical for bypassing additional security controls enforced by the victim’s organisation, ultimately enabling the attacker to gain access to the victim’s email.

  1. Lateral Movement via Teams Chats

Once the threat actor successfully compromises an account, they are able to impersonate the legitimate user within the organisation. Leveraging this impersonation capability, the attacker continues their intrusion by sending phishing messages via Microsoft Teams to additional users listed in the tenant’s directory. These messages often appear as legitimate communications from a trusted colleague, increasing the likelihood of the recipients engaging with malicious content, such as links to credential-harvesting sites or weaponised attachments. This lateral movement technique allows the attacker to propagate their access within the environment, compromise more accounts, and establish a wider foothold for further exploitation or data exfiltration.

MITRE ATT&CK MAPPING

How to Detect APT29 Activity with InsiderSecurity CSX

Organisations can detect and respond to these threats with advanced cloud-native monitoring. InsiderSecurity CSX provides robust detection use cases, including:

  1. Abnormal Token tenant ID
  2. Unusual App Given Access (Azure, GWS, M365)
  3. Application Credentials Added
  4. Third Party Cloud Application Installed
  5. Email forwarding settings changed
  6. User Updated Mailbox Rules
  7. SharePoint/OneDrive Data Theft
  8. Unusual User Agent
  9. Unusual User IP address

Zero Trust Security and continuous behavioural analytics are essential in detecting modern identity-based attacks.

CONCLUSION

In conclusion, phishing campaigns via Microsoft Teams have emerged as a sophisticated and highly targeted attack vector exploited by the Russian APT group Midnight Blizzard (also known as APT29 or Cozy Bear) primarily for espionage purposes. Leveraging compromised Microsoft 365 tenants, the group crafts convincing social engineering lures that impersonate technical support to trick users into revealing credentials or approving multifactor authentication prompts, enabling persistent access to sensitive environments. To defend against such threats, organisations should enforce strict identity and access management controls, implement robust user awareness training focused on social engineering tactics, and apply continuous monitoring of authentication events and external collaboration activities to detect and mitigate unauthorised access attempts early.

Indicators of Compromise (IoCs)

DomainTypeDescription
msftprotection.onmicrosoft[.]comDomain nameMalicious actor-controlled subdomain
mlcrosoftaccounts.onmicrosoft[.]comDomain nameMalicious actor-controlled subdomain
msftonlineservices.onmicrosoft[.]comDomain nameMalicious actor-controlled subdomain
msonlineteam.onmicrosoft[.]comDomain nameMalicious actor-controlled subdomain
msftservice.onmicrosoft[.]com       Domain nameMalicious actor-controlled subdomain
noreplyteam.onmicrosoft[.]com    Domain nameMalicious actor-controlled subdomain
accounteam.onmicrosoft[.]com    Domain nameMalicious actor-controlled subdomain
teamsprotection.onmicrosoft[.]coDomain nameMalicious actor-controlled subdomain
identityVerification.onmicrosoft[.]comDomain nameMalicious actor-controlled subdomain
accountsVerification.onmicrosoft[.]comDomain nameMalicious actor-controlled subdomain
azuresecuritycenter.onmicrosoft[.]comDomain nameMalicious actor-controlled subdomain
teamsprotection.onmicrosoft[.]com   Domain nameMalicious actor-controlled subdomain

Exploitation of “xp_cmdshell” in MS SQL: Critical Risks & How to Defend

What is xp_cmdshell

xp_cmdshell is an extended stored procedure in Microsoft SQL Server that allows users to execute Windows shell commands from the SQL Server environment. While it is a powerful feature designed for administrative tasks, it can also be abused by attackers to gain initial access, escalate privileges, and move laterally within a network. The Windows process spawned by xp_cmdshell has the same security rights as the SQL Server service account. 

How does xp_cmdshell execute Windows commands? 

When xp_cmdshell is executed, it spawns a command shell on the Windows operating system and runs the specified command. The command is executed with the privileges of the SQL Server service account, and this determines the level of access the attacker has to the underlying system. 

Below are the service accounts that are commonly used to execute the command: 

  1. SQL Server Service Account: By default, xp_cmdshell executes commands under the context of the service account running the SQL Server instance. 
  1. “NT AUTHORITY\SYSTEM” (Local System) – Full administrative privileges. 
  1. “NT SERVICE\MSSQLSERVER” (Default SQL Server service account) – Limited privileges. 
  1. A domain service account  
  1. Proxy Account (Optional): If configured, xp_cmdshell can use a lower-privileged proxy account instead of the SQL Server service account.  

If the user is not a member of the SysAdmin Role, the xp_cmdshell will execute the commands using the account name and password stored in the credential named “xp_cmdshell_proxy_account”

The main vulnerability is that the service account often has more privileges than the executed processes require, which means it should be enabled for some specific users only.  

Why is xp_cmdshell susceptible to attacks? 

Several factors contribute to the security risks associated with xp_cmdshell

  1. Privilege Levels – Since xp_cmdshell executes commands with the SQL Server service account’s privileges, it can be extremely dangerous if that account has administrative rights on the system. 
  1. Weak Authentication & Misconfigurations – Poorly secured SQL Servers with weak credentials or default settings make it easier for attackers to gain access and enable xp_cmdshell
  1. SQL Injection Exploits – If an application connected to SQL Server is vulnerable to SQL injection, attackers can execute commands through xp_cmdshell without even having direct access to the database. 
  1. Lack of Monitoring & Logging – Many organisations fail to properly monitor SQL Server logs, allowing attackers to enable xp_cmdshell and execute commands undetected. 
  1. Lateral Movement Capabilities – Once an attacker gains control of a system via xp_cmdshell, they can use built-in Windows tools like psexec and wmic to pivot to other machines in the network. 
  1. Persistence Mechanisms – Attackers can use xp_cmdshell to create scheduled tasks or modify registry entries to maintain long-term access. 

MITRE ATT&CK MAPPING

The misuse of xp_cmdshell aligns with several MITRE ATT&CK tactics and techniques below:

Real-world exploitation techniques of xp_cmdshell  

By default, xp_cmdshell is disabled in modern versions of SQL Server, but attackers often attempt to enable it during exploitation. If enabled, it provides a direct path to executing malicious commands, downloading additional payloads, and gaining full control over the compromised system. 

 Thus, attackers begin by checking if xp_cmdshell is enabled and if it isn’t, they proceed to enable it. 

If the MSSQL returns an error, then the attacker enables xp_cmdshell with the following command: 

Following the enabling of xp_cmdshell, attackers then execute a reverse shell to maintain access and conduct further exploitation. Commonly, attackers encode their reverse shell command to evade security measures.  Below is an example: 

Once the payload is executed through xp_cmdshell, a reverse shell connection is spawned and connectable by the attacker with access to a privileged service account. 

How xp_cmdshell misconfiguration enable SQL Injection to Target the OS 

In many environments, SQL Server runs with high privileges, sometimes as Local System or an administrator-level service account. This means any command executed through xp_cmdshell inherits these privileges, allowing an attacker to perform system-wide operations. If the SQL Server service account has excessive permissions, an attacker exploiting xp_cmdshell could execute an SQL Injection Leading to OS Exploitation. Below are the following examples: 

Exploiting a Vulnerable Web Application 

Consider a login form with an improperly sanitised SQL query: 

An attacker could input the following payload in the username field: 

This forces the database to execute whoami, revealing the privilege level of the SQL service account. With administrative privileges, an attacker can: 

  1. Add a new administrator account 
  1. Download and execute a backdoor 

Exploiting MSSQL Access via Reverse Proxy 

If an attacker has gained access to an MSSQL server through a reverse proxy (e.g., from an initial foothold), they can use xp_cmdshell to further escalate privileges: 

If the server is domain-joined, they can attempt lateral movement: 

They may also dump credentials: 

Remediation Against xp_cmdshell exploitation 

To defend against xp_cmdshell exploitation, organisations should disable it unless necessary and enforce strict authentication for database access. The SQL Server service account should have minimal privileges, preventing it from executing system-wide commands. Logging and monitoring tools should be used to detect unauthorised use of xp_cmdshell. Implementing network segmentation and restricting database access to trusted systems can limit lateral movement. Additionally, web applications should be hardened against SQL injection by using parameterised queries and Web Application Firewalls (WAFs). Regular security audits and vulnerability assessments should be conducted to identify misconfigurations and reduce exposure to attacks. 

Implementation of an automated response and alert system can be done through InsiderSecurity’s Database Activity Monitor (DAM).  

Conclusion

xp_cmdshell is a powerful yet dangerous feature in MS SQL Server. While it can facilitate administrative tasks, it is also a prime target for attackers seeking initial access and privilege escalation. Organisations must disable xp_cmdshell when not needed, enforce strict security policies, and monitor their SQL environments for potential exploitation attempts. 

By understanding the risks and attack vectors associated with xp_cmdshell, security teams can better defend against cyber threats and ensure the integrity of their SQL Server deployment. 

Staying ahead of cyber threats

Looking for ways to stay ahead of any cyber threats? InsiderSecurity provides advanced cybersecurity behaviour analytics products that help your company to uncover cyber threats before there is any serious data loss. We offer a range of solutions, including Automated UEBA for securing on-premise and cloud IT infrastructure, as well as the CSX for ensuring cloud data security.   

DAM is designed to detect sophisticated attacks described in this article making it an essential subscription for any organisation serious about its cybersecurity posture. Beyond detecting threats, DAM offers recommendations and a user-friendly avenue for executing remedial actions and implementing mitigation strategies.  

M365 Botnet Password Spraying Attack 

Introduction

SecurityScorecard discovered that Microsoft 365 (M365) tenants globally are targeted with password spraying attack by a nation state threat actor. These attacks exploit non-interactive sign-ins with Basic Authentication. This enables threat actors to bypass modern login protections by evading Multi-Factor Authentication (MFA). The botnet, active since at least December 2024​​, was composed of over 130,000 devices working in the Asia/Shanghai timezone. 

Attack Overview

According to SecurityScorecard, the botnet consists of over 130,000 compromised devices controlled by six command and control (C2) hosted on servers in United States​. These botnets route their traffics through proxies hosted on China affiliated hosting servers, UCLOUD HK and CDS Global Cloud. The threat actor targets M365 accounts across multiple organizations. These attacks employ Tactics, Techniques & Procedures (TTP) such as Password spraying, non-interactive sign-ins, Basic authentication abuse, Use of stolen credentials and Proxy-based evasion. The botnet uses stolen credentials from infostealer logs to systematically attempt login to M365 accounts by using Non-Interactive sign-ins. This allows the threat actor to evade Multifactor Authentication (MFA) enforcement and bypass Conditional Access Policy (CAP)​. Due to these logins being logged as Non-Interactive Sign-In, it results in reduced security visibility. Commonly, Non-Interactive Sign-In are used for service-to-service authentication, legacy protocols (e.g., POP, IMAP, SMTP), and automated processes thus not triggering MFA in many configurations. Basic Authentication enabled in some environments, allows credentials to be transmitted in plain form, making it a prime target for threat actors.  

Mapping the attack to MITRE ATT&CK framework 

We can map the attacks to the following Tactics, Techniques, and Procedures (TTPs) in MITRE. 

Attack Analysis 

The threat actor performs password spraying through Non-Interactive Sign-In in order to gain access to M365 accounts. Events associated with spraying attacks through these botnets use “fasthttp” user agent string as detected by SpearTip Security Operations Center. Fasthttp is a high-performance HTTP server and client library for the Go programming language, designed to handle HTTP requests. All observed attempts have targeted the Azure Active Directory Graph API (Application ID: 00000002-0000-0000-c000-000000000000). Data analyzed from a large set of Microsft 365 tenants indicates that “fasthttp” was first observed as a user agent on January 6th, 2025. Further investigation led to the discovery of six Command and Control (C2) servers with these IP addresses:  

  1. 70.39.115.74  
  1. 70.39.120.10  
  1. 204.188.218.178 
  1. 204.188.218.179 
  1. 204.188.210.226 
  1. 204.188.210.227  

Investigating the C2 servers reveals 10 open ports that are being used for various purposes. The list of ports used by the C2 servers are:  

Port Service Possible Use 
1002 Unknown Unknown 
2181 Zookeeper Kafka 
3306 MySQL Data storage or Botnet Configuration 
6379 Redis Key-value store 
7779 Unknown Unknown 
8081 Jetty web service Zookeeper query service 
10050 Zabbix Agent Potential botnet monitoring 
33060 MySQL X Protocol Likely used with MySQL service 
12341  Botnet C2 channel (Client Registration) 
12342  Possibly used for tasking infected hosts 
12347  Possible data exfil or backup C2 
12348  High probability of main C2 command execution 

These servers run Apache Zookeeper, a distributed system coordination framework, suggesting the likely use of a distributed campaign infrastructure. Notably, the presence of Zookeeper—an industry-standard for distributed systems—may indicate a sophisticated threat actor with advanced software engineering expertise, considering the challenges of maintaining a Zookeeper cluster at scale. Port 8081 remains unrestricted, allowing server queries that revealed additional details including uptime information. Further analysis of the Zookeeper nodes indicates they also operate Apache Kafka. 

Remediation

For remediation, implementing a robust monitoring strategy across all M365 environments. This includes monitoring Non-interactive Sign-In access logs for the presence of unknown or suspicious user agents that may indicate malicious activity. M365 environment administrator should enforce an immediate password reset for all compromised accounts and invalidate active sessions to prevent further unauthorized access.  

In addition, the deployment of automated alerts and remediation workflows is essential for reducing response times and minimizing the overall impact of an attack. By integrating automated detection systems with remediation protocols, organizations can ensure that security teams are alerted in real time, enabling them to take swift, targeted actions. This not only improves operational efficiency but also ensures that security breaches are mitigated with minimal delay. It is imperative that these processes be continuously reviewed and updated to address evolving threat tactics and maintain a high level of protection for M365 environments. 

Implementation of an automated response and alert system can be done through InsiderSecurity’s CSX.  

CSX dashboard highlights multiple failed login attempts from different IP addresses into the same user account, helping security teams quickly identify potential brute-force or credential-stuffing attacks.

Staying ahead of cyber threats  

Looking for ways to stay ahead of any cyber threats? InsiderSecurity provides advanced cybersecurity behavior analytics products that help your company to uncover cyber threats before there is any serious data loss. We offer a range of solutions, including Automated UEBA for securing on-premise and cloud IT infrastructure, as well as the CSX for ensuring cloud data security.   

CSX is designed to detect sophisticated attacks described in this article making it an essential subscription for any organization serious about its cybersecurity posture. Beyond detecting threats, CSX offers recommendations and a user-friendly avenue for executing remedial actions and implementing mitigation strategies.  

CSX provides an easy way to perform mitigation and remediation.

​​​ 

InsiderSecurity Recognised as One of Asia-Pacific’s High-Growth Companies by Financial Times

Singapore, 25 March 2025 – InsiderSecurity, a leader in cybersecurity innovation, has been named one of Asia-Pacific’s High-Growth Companies 2025 by the Financial Times and Statista, cementing its position as a key player in the region’s rapidly expanding cybersecurity sector. This recognition underscores InsiderSecurity’s dynamic growth and its pivotal role in safeguarding organisations across Asia-Pacific against evolving cyber threats. 

Explore the full Financial Times list here.

Accelerating Growth Through Advanced Cybersecurity Solutions 

Headquartered in Singapore, InsiderSecurity is an award-winning cybersecurity software company on a mission to simplify digital security for enterprises, critical infrastructure and governments. Its suite of cutting-edge solutions—including CSX, Database Activity Monitor (DAM), and Smart Log Review —empowers organisations to detect, analyse, and mitigate threats efficiently in today’s fast-paced digital economy. 

With its R&D and strong support based in the region, InsiderSecurity solutions help to address the unique cybersecurity challenges faced by organisations across Asia-Pacific. 

Trailblazing Industry Firsts 

InsiderSecurity continues to set benchmarks in cybersecurity excellence. It is the first ASEAN cybersecurity company to achieve CSA STAR Level 2 certification, the gold standard for cloud security, alongside ISO 27001 accreditation for world-class information security management. 

The firm also earned distinction as the first cybersecurity provider accredited by Singapore’s Infocomm Media Development Authority (IMDA) in User and Entity Behavior Analytics (UEBA), a critical capability for identifying sophisticated insider threats and external attacks. 

These achievements reflect InsiderSecurity’s commitment to advancing cybersecurity standards and delivering trusted solutions that meet global compliance requirements. 

Exceptional Growth Metrics

InsiderSecurity’s inclusion in the Financial Times High-Growth Companies Asia-Pacific 2025 list is backed by impressive financial and operational growth metrics: 

  • Absolute Growth Rate: 513.04% 
  • Compound Annual Growth Rate (CAGR): 83.02% 
  • InsiderSecurity ranking: 105th out of the top 500 companies 

These figures highlight InsiderSecurity’s remarkable trajectory, driven by its innovative solutions. 

Why This Recognition Matters 

Inclusion in the Financial Times High-Growth Companies Asia-Pacific 2025 list highlights InsiderSecurity’s remarkable revenue growth and its ability to deliver scalable, impactful solutions.  

It is a strong testimonial that InsiderSecurity delivered effective cybersecurity solutions for our customers. 

This accolade follows InsiderSecurity’s earlier recognition as one of Singapore’s Fastest-Growing Companies by The Straits Times and Statista, further validating our focus on innovation and customer value. 

Looking to the Future 

InsiderSecurity remains dedicated to its mission: simplifying cybersecurity for organisations across Asia-Pacific and beyond. By combining deep regional expertise with globally certified technologies, the company is poised to empower businesses to thrive securely. 

Learn more about InsiderSecurity’s solutions at www.insidersecurity.co. 

About Financial Times High-Growth Companies Asia-Pacific 

The Financial Times’ High-Growth Companies Asia-Pacific ranking, produced with Statista, identifies organisations that have achieved extraordinary revenue growth between 2020 and 2023. The list celebrates innovation, agility, and resilience in one of the world’s most dynamic economic regions. 

About InsiderSecurity 

InsiderSecurity is an award-winning cybersecurity company headquartered in Singapore. A pioneer in ASEAN, it holds CSA STAR Level 2  and  ISO 27001 certifications and is IMDA-accredited for its UEBA innovations. Its solutions are trusted by government agencies, critical infrastructure operators, and enterprises to combat advanced cyber threats. 

What is UEBA? A Quick Guide to User and Entity Behavior Analytics (UEBA)

Visibility into user actions is one of the critical challenges in the modern digital landscape. Traditional rule-based security solutions that generate a high number of alerts within modern environments are no longer practical; a new approach is needed. This is where User and Entity Behavior Analytics (UEBA) emerges as a critical security component, providing cybersecurity teams with visibility into user behaviors. Powered by technologies such as Artificial Intelligence and Machine Learning, UEBA establishes baselines for regular user activity within a network and then identifies deviations from these baselines. This empowers cybersecurity teams to detect advanced attacks, such as insider threats and zero-day exploits, which can easily slip under the radar of traditional security products.

What is UEBA?

UEBA utilizes a data-driven approach to cybersecurity by baselining normal behavior using advanced technologies such as machine learning. Any activity that deviates from this baseline is flagged for investigation. This advanced analytics approach enables it to detect subtle, advanced attacks that would be undetectable by controls like firewalls and anti-malware solutions. UEBA has emerged as a critical defense in modern cybersecurity frameworks as attacks increase in sophistication and complexity.

An example of where UEBA can provide visibility is in cases of compromised accounts. Credential compromise is an extremely difficult attack to detect once the attacker has successfully authenticated using the stolen credentials. However, UEBA can detect patterns in user behavior that are indicative of suspicious activity and flag them for review, potentially averting a cybersecurity incident.

Another example would involve insider threats, which are even more challenging to detect than compromised accounts. An employee abusing the authorized access they have been granted can be detected by UEBA, due to unusual file access patterns or data exfiltration attempts that might go unnoticed by other solutions.

How does UEBA work?

UEBA applies the power of machine learning to detect anomalies within the massive amounts of data generated in an environment. A UEBA solution is typically implemented in the following steps:

  • Data Ingestion and Aggregation: A UEBA requires visibility into the environment to work effectively. This is achieved by gathering and aggregating data from audit logs, network traffic, authentication, and authorization systems, etc. This data is crucial for the UEBA to learn the environment.
  • Baselining: In this phase, the UEBA utilizes its powerful machine learning algorithms to develop a baseline of what is and is not normal within the environment. The more information about the environment the UEBA learns, the better it is at detecting potential malicious activity. This baseline is not static and evolves over time as user behavior changes.
  • Monitoring: In this phase, the UEBA starts monitoring and flagging anomalies such as unusual privileged activity, unusual logins, excessive file downloads, etc. The nuanced and intelligent approach it provides to cybersecurity monitoring makes it a powerful tool within an environment that complements existing endpoint and network security controls.

UEBA use cases

UEBA can handle various use cases within cybersecurity due to its behavior-centric model. Let us take a look at some of the critical scenarios where UEBA can be particularly effective:

  • Insider Threats: Employees with malintent can cause significant damage to an organization by abusing the authorized access they have been granted. A UEBA can detect such malicious intent by identifying patterns of behavior that differ from how the employee typically operates, such as working at odd hours, unusual logins, excessive downloads, etc. This can be extremely effective for organizations that grant employees access to highly sensitive data or during periods of high turnover, where the risk of disgruntled employees is high.
  • Compromised Accounts: Attackers can compromise user credentials to gain access to an environment to carry out cyberattacks. The same principle as the previous scenario applies here, where the UEBA could detect deviations from how the user usually operates and flag it for review.
  • Brute-force Attacks: Repeated attempts to guess passwords or gain access to a system can indicate an employee trying to access unauthorized systems. UEBA can detect and flag this behavior, which may indicate a larger attack or fraud.
  • Privilege Abuse and Misuse: Users with high privileges within an environment carry a higher level of risk than traditional employees. They can be socially engineered into handing over their credentials or attempting to abuse the access themselves. A UEBA solution can detect if an admin-level user behaves in a way that is different from their traditional activities, leading to early detection of malintent.
  • Privilege Escalation: The first step that attackers carry out once they have compromised an environment is to elevate their privileges. This enables them to carry out further attacks and establish a foothold within the environment. UEBA can detect such elevation of privileges and proactively flag such permission changes to the cybersecurity teams.
  • Unauthorized Data Access & Exfiltration: Data leakage is another crucial risk area that is often difficult to defend against. Employees can attempt to circumvent the organization’s policies by exfiltrating data, or the same can be part of a more significant cyberattack. UEBA can detect such data transfers and sound an early alarm to avert a potential data breach.
  • Automated Risk Prioritization: UEBA recognizes that not all events are equal and prioritizes its alerts based on intelligent risk scoring. This enables cybersecurity teams to focus on those events that require immediate attention and prevents them from drowning in “alert fatigue.”

These scenarios highlight the versatility of UEBA as a security component and its ability to adapt to different types of security scenarios within an organization.

How InsiderSecurity can help with Automated UEBA

Cyberattacks are increasing in complexity every year, and it is clear that UEBA is one of the most critical controls to implement to protect against today’s advanced attacks. InsiderSecurity’s Automated UEBA can help protect your organization with its unique features that set it apart from SIEMs:

  • Comprehensive Defense: The ability to protect data both on-premises and in the cloud provides a consolidated line of defense against attacks. Cybersecurity teams can obtain clear visibility into how data is accessed, used, and moved between environments.
  • Advanced Threat Detection: Automated UEBA leverages advanced machine learning algorithms to detect suspicious activity at both the user and network levels, empowering cybersecurity teams to take swift remedial action.
  • Cost Savings: With reduced raw log volumes and fewer IT analysts needed, save on manpower. Our solution solves today’s modern threats and enables organizations to reduce the risk of security events without compromising productivity. UEBA is a crucial strategic control in any modern environment, and we are here to guide you through this essential journey with our state-of-the-art solution.

Our solution addresses today’s modern threats and enables organizations to reduce the risk of security events without compromising productivity. UEBA is a crucial strategic control in any modern environment, and we are here to guide you through this essential journey with our state-of-the-art solution.

InsiderSecurity recognised as one of Singapore’s Fastest Growing Companies by The Straits Times

Singapore, 21 Feb 2025 – InsiderSecurity has been recognised as one of Singapore’s Fastest Growing Companies in 2025 by The Straits Times and Statista. This milestone underscores InsiderSecurity’s commitment to innovation and growth in Asia’s cybersecurity landscape.
Read our full story in The Straits Times

Driving Growth with Cutting-Edge Cybersecurity Solutions

Founded and headquartered in Singapore, InsiderSecurity is an award-winning cybersecurity software company with a mission to simplify cybersecurity across Asia. The company’s cutting-edge solutions, including CSX, Database Activity Monitor (DAM), and Smart Log Review, are trusted by government agencies, critical information infrastructure (CII) providers, and major enterprises.

InsiderSecurity’s engineering team, deeply rooted in the ASEAN region, ensures that its solutions are not only technologically advanced but also tailored to address the challenges faced by organisations in this fast-evolving digital economy.

Pioneering Achievements

InsiderSecurity stands out as the first cybersecurity software company in ASEAN to achieve CSA STAR Level 2 certification, the global standard in cloud security, together with ISO 27001 accreditation for information security management.

Additionally, the company was the first to be accredited by Singapore’s Infocomm Media Development Authority (IMDA) in the key cybersecurity area of User and Entity Behavior Analytics (UEBA), highlighting its expertise in stopping sophisticated threats.

This forward-thinking approach has earned InsiderSecurity industry-wide recognition, solidifying its reputation as a leader in cybersecurity innovation.

Expanding into ASEAN Markets

With offices in Singapore and Malaysia, InsiderSecurity is poised to expand its reach across Asia. The region’s rapid digitalisation and increasing focus on cybersecurity present significant growth opportunities. By leveraging its expertise, InsiderSecurity aims to become a key cybersecurity software partner for organisations navigating complex regulatory environments and emerging cyber threats.

Recognition as a Fast-Growing Company

Being named one of Singapore’s Fastest Growing Companies for 2025 reflects InsiderSecurity’s exceptional trajectory of growth and its ability to deliver value to clients. This recognition reinforces the company’s leadership position in Asia’s cybersecurity landscape.

Looking Ahead

InsiderSecurity’s mission is to provide technology that simplifies cybersecurity in Asia and beyond. With a relentless focus on innovation and a deep understanding of the region’s cybersecurity needs, InsiderSecurity is positioned to help organisations stay secure in a rapidly evolving digital world.

For more information on InsiderSecurity and its solutions, visit www.insidersecurity.co.


About Singapore’s Fastest Growing Companies

The Straits Times and Statista annually recognise the fastest-growing companies in Singapore. The ranking serves as a benchmark for innovation and excellence in business.

About InsiderSecurity

InsiderSecurity is an award-winning cybersecurity software company based in Singapore and Malaysia. It is the first in ASEAN to achieve CSA STAR Level 2 certification and ISO 27001 accreditation and is a pioneer in User and Entity Behavior Analytics (UEBA) accredited by Singapore’s IMDA. Its innovative solutions are trusted by government agencies, critical infrastructure, and leading enterprises.

InsiderSecurity has been recognised as one of Singapore's Fastest Growing Companies 2025