Security

CSO

CISA unleashes Untitled Goose Tool to honk at danger in Microsoft's cloud

Not a headline we expected to write today


American cybersecurity officials have released an early-warning system to protect Microsoft cloud users.

The US government's Cybersecurity and Infrastructure Security Agency (CISA) released the software, developed in conjunction with Sandia National Labs, to help network administrators spot potentially malicious activity in the Microsoft Azure cloud, Microsoft 365 services, and Azure Active Directory (AAD).

Dubbed the Untitled Goose Tool, CISA said it "offers novel authentication and data gathering methods for network defenders to use as they interrogate and analyze their Microsoft cloud services."

The introduction of Untitled Goose Tool comes the same day as the agency announced its Pre-Ransomware Notification Initiative, which delivers early warnings to organizations about attacks, possibly in enough time to stop the attacks before the miscreants can encrypt or steal data.

"We know that ransomware actors often take some time after gaining initial access to a target before encrypting or stealing information, a window of time that often lasts from hours to days," Clayton Romans, associate director of the Joint Cyber Defense Collaborative (JCDC), wrote in a blog post. "This window gives us time to warn organizations that ransomware actors have gained initial access to their networks."

Both efforts are aimed at making enterprises more proactive in defending against attacks and this month also saw the rollout of the Decider tool to make it easier for organizations to map adversary behavior to the MITRE ATT&CK framework to identify gaps in their defenses and go threat hunting.

Take a bird's eye view

Network pros can use Untitled Goose Tool for exporting and reviewing AAD sign-in and audit logs, Microsoft 365's unified audit log (UAL), Azure activity logs, Defender for IoT alerts, and Defender for Endpoint data for suspicious activity. They also can look into Azure, Microsoft 365, and AAD configurations to spot sloppy security.

"Network defenders attempting to interrogate a large M365 tenant via the UAL may find that manually gathering all events at once is not feasible. Untitled Goose Tool uses novel data gathering methods via bespoke mechanisms," CISA wrote [PDF].

Given that, the tool makes it easier to draw cloud artifacts from the cloud services without further analytics, setting time bounds for the UAL using a feature called "goosey graze" and then extracting data within the timeframes with "goosey honk." The same can be used for data from Defender for Endpoint.

Untitled Goose Tool can be used with both Windows and macOS, though the PowerShell script is best used only with Windows. It requires Python 3.7, 3.8, or 3.9 and is available from CISA's GitHub repository along with the PowerShell script.

The agency's unveiling of the Pre-Ransomware Notification Initiative comes less than two weeks after it announced Ransomware Vulnerability Warning Pilot to warn critical infrastructure entities about flaws in their systems that could be exploited by ransomware groups.

The notification effort started in January and so far has alerted more than 60 entities in such industries as healthcare, energy, water and wastewater, and education about possible pre-ransomware, with some address the problem before data was encrypted or stolen, according to Romans.

There are two key parts to it. The JCDC collects tips from cybersecurity researchers, infrastructure providers, and cyberthreat companies about possible ransomware activity in the early stages. The JCDC – a public-private group launched in August 2021 – then notifies organizations targeted by miscreants about the threat and guides them through mitigation. ®

Send us news
11 Comments

AWS accuses Microsoft of clipping customers' cloud freedoms

World's biggest off-prem service slinger submits comments to UK cloud inquiry, mostly has Redmond HQ's rival in its sights

Microsoft adds FPGA-powered network accelerator to Azure

'Azure Boost' vastly speeds cloudy server IOPS and is coming to all new instance types

Google submits complaints about Microsoft licensing to UK competition regulator

Now Microsoft has regulator breathing down its neck in three regions

Microsoft, Databricks double act tries to sew up the data platform market

But the one-stop shop vision fails to take it far beyond the competition

Microsoft opens sources ThreadX under MIT license

The 'Azure RTOS' used in millions of Raspberry Pis is now FOSS

Experienced Copilot help is hard to find, warns Microsoft MVP

Almost nobody has used it, or knows it well, so beware of consultants bearing cred

Microsoft's relationship with OpenAI now in competition regulator's sights

Has recent CEO, board shenanigans given rise to a merger situation? CMA is asking for a friend

Attacks abuse Microsoft DHCP to spoof DNS records and steal secrets

Akamai says it reported the flaws to Microsoft. Redmond shrugged

Microsoft issues deadline for end of Windows 10 support – it's pay to play for security

Limited options will be available into 2028, for an undisclosed price

Black Basta ransomware operation nets over $100M from victims in less than two years

Assumed Conti offshoot averages 7 figures for each successful attack but may have issues with, er, 'closing deals'

Scores of US credit unions offline after ransomware infects backend cloud outfit

Supply chain attacks: The gift that keeps on giving

Microsoft confirms Smart App issue renaming everyone's printers to HP

Not only turning up uninvited, but telling folks they suddenly have a LaserJet