Security

Microsoft Defender Detects Infiltrating IT Workers

3 min read

Summary

Microsoft has outlined detection strategies for identifying North Korea-aligned threat actors posing as remote IT hires to infiltrate organizations. The guidance focuses on correlating HR SaaS, identity, email, conferencing, and Microsoft 365 signals so security and HR teams can spot suspicious candidates before and after onboarding.

Need help with Security?Talk to an Expert

Introduction

Microsoft is warning organizations about a growing threat: fake remote IT workers who use stolen or fabricated identities to get hired and gain legitimate access to corporate systems. For security teams managing Microsoft 365, Defender, and SaaS integrations, this matters because the attack starts in normal HR processes and can quickly become an identity and data security incident.

What’s new

Microsoft’s latest guidance explains how defenders can detect this activity across the full hiring lifecycle, with Jasper Sleet cited as a known example of this tactic.

Pre-recruitment detection in Workday

Microsoft observed suspicious use of Workday Recruiting Web Service endpoints exposed through external career sites. Key behaviors include:

  • Repeated access to hrrecruiting/* API endpoints
  • Calls to job application, resume, and questionnaire APIs
  • Multiple external accounts showing the same repeating access pattern
  • Activity originating from known threat actor infrastructure

With the Microsoft Defender for Cloud Apps Workday connector, organizations can track these API calls, identify external accounts, and compare activity against threat intelligence.

Recruiting phase investigation

During interviews and document handling, defenders should correlate additional signals such as:

  • Suspicious email exchanges with hiring teams
  • External Teams messages from risky IP addresses or accounts
  • Activity in Zoom or Cisco Webex via Defender for Cloud Apps connectors
  • DocuSign activity related to offer letters from suspicious sources

This helps security and HR teams flag fraudulent candidates earlier in the process.

Post-hire identity and SaaS monitoring

Once hired, the risk increases because the actor receives a legitimate account. Microsoft observed cases where new hire Workday sign-ins and payroll changes came from known malicious infrastructure. After onboarding, defenders should watch for:

  • Impossible travel alerts on new hire accounts
  • Access from anonymous proxies or unusual locations
  • Search and download activity in Teams, SharePoint, OneDrive, and Exchange Online
  • Unusual data access patterns during the first weeks or months of employment

Why this matters for IT admins

This is not just an HR issue. A fraudulent hire can bypass many traditional perimeter defenses because they receive valid credentials and approved access. Security teams need visibility across HR systems, Entra ID, Microsoft 365, and third-party collaboration tools to catch the behavior early.

  • Review Workday API telemetry for repeated hrrecruiting/* activity
  • Enable and validate Defender for Cloud Apps connectors for Workday, Zoom, Webex, and DocuSign where applicable
  • Hunt for suspicious communications involving candidates and external accounts
  • Closely monitor new hire identities for impossible travel, proxy use, and abnormal Microsoft 365 access
  • Coordinate HR and security investigations for suspicious onboarding events

Organizations with remote hiring programs should treat recruitment workflows as part of their identity attack surface and include them in threat hunting and detection strategies.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Microsoft DefenderWorkdayremote IT workersidentity securityDefender for Cloud Apps

Related Posts

Security

Opportunistic Cyberattacks: Microsoft’s Design Playbook

Microsoft is urging organizations to make opportunistic cyberattacks harder by removing credentials, shrinking public attack surfaces, and standardizing secure platform patterns. The guidance is especially relevant for teams running Azure, Dynamics 365, and Power Platform workloads at scale, where inconsistent architectures and exposed secrets can make lateral movement easier for attackers.

Security

Cross-Tenant Teams Impersonation Attack Playbook

Microsoft has detailed a human-operated intrusion chain where attackers use cross-tenant Microsoft Teams chats to impersonate helpdesk staff and trick users into granting remote access through tools like Quick Assist. The campaign matters because it blends legitimate collaboration, remote support, and admin tools to enable lateral movement, persistence, and data exfiltration while appearing like normal IT activity.

Security

Microsoft Defender Predictive Shielding Stops AD Attacks

Microsoft detailed how Defender’s predictive shielding can contain Active Directory domain compromise by restricting exposed high-privilege accounts before attackers can reuse stolen credentials. The capability helps security teams reduce lateral movement and close the response gap during fast-moving identity attacks.

Security

Sapphire Sleet macOS Intrusion: Key Defender Insights

Microsoft Threat Intelligence detailed a macOS-focused campaign by Sapphire Sleet that uses social engineering and fake software updates instead of exploiting vulnerabilities. The attack chain relies on user-initiated AppleScript and Terminal execution to bypass native macOS protections, making layered defenses, user awareness, and endpoint detection especially important.

Security

Cryptographic Inventory Strategy for Quantum Readiness

Microsoft is urging organizations to treat cryptographic inventory as the first practical step toward post-quantum readiness. The company outlines a continuous cryptography posture management lifecycle to help security teams discover, assess, prioritize, and remediate cryptographic risks across code, networks, runtime, and storage.

Security

AI Incident Response: What Security Teams Must Change

Microsoft says traditional incident response principles still apply to AI systems, but teams must adapt to non-deterministic behavior, faster harm at scale, and new categories of risk. The company highlights the need for better AI telemetry, cross-functional response plans, and staged remediation to contain issues quickly while longer-term fixes are developed.