Security

Third-Party Compromise Enables Stealthy Trusted Access

3 min read

Summary

Microsoft Incident Response detailed a stealthy intrusion in which attackers abused a compromised third-party IT services provider and trusted management tools to gain long-term access. The case highlights how legitimate admin channels, identity infrastructure, and web-based persistence can be misused, making stronger monitoring of trusted relationships critical for defenders.

Need help with Security?Talk to an Expert

Introduction

Microsoft has published a new incident response case study showing how threat actors can bypass traditional detection by abusing trusted relationships instead of relying on obvious malware or exploits. For IT and security teams, the key takeaway is clear: approved tools, delegated admin models, and third-party service providers can become part of the attack surface.

What happened

Microsoft Incident Response investigated an intrusion where the attacker compromised a third-party IT services provider and used legitimate enterprise management tooling to operate inside the customer environment.

Key findings

  • The attacker used HPE Operations Agent (OA) and HPE Operations Manager (HPOM) as the primary delivery path.
  • Microsoft noted there was no vulnerability in HPE OA itself; the risk came from abuse of a trusted operational relationship.
  • Activity blended in with normal administration, delaying detection.
  • The campaign focused on:
    • Long-term persistence
    • Credential theft
    • Lateral movement
    • Reestablishing access after partial disruption

Attack progression

Microsoft’s timeline shows a slow, deliberate intrusion:

  • Day 1: Initial foothold through the third-party trust path
  • Days 9–14: Credential interception introduced on domain infrastructure
  • Days 24–32: Web-based persistence established on internet-facing servers
  • Days 40–60: Lateral movement to additional and sensitive systems
  • Days 104–106: Persistence reestablished after detection efforts

Techniques used

The report highlights several notable methods:

  • Web shells found on internet-exposed web servers
  • VBScript deployment through HPOM to execute discovery actions
  • Credential harvesting on domain controllers using a malicious network provider named mslogon
  • Abuse of Windows authentication notification APIs such as:
    • NPLogonNotify
    • NPPasswordChangeNotify

This allowed the attacker to capture cleartext credentials during sign-ins and password changes, then store them locally for reuse.

Why this matters for administrators

This incident is a strong reminder that security monitoring cannot focus only on malware, exploits, or unknown binaries. Legitimate signed tools and delegated administration platforms can be used as attack infrastructure when trust boundaries are not tightly controlled.

Security teams should pay particular attention to:

  • Third-party remote management and monitoring platforms
  • Administrative script execution through approved tools
  • Unexpected changes to network providers on domain systems
  • Authentication-related DLL registrations and credential access behavior
  • Persistence mechanisms on internet-facing servers

Microsoft’s post includes Defender detection and hunting guidance, along with mitigation recommendations. Organizations should:

  • Review and restrict third-party privileged access
  • Audit trust relationships and delegated admin paths
  • Hunt for unusual HPOM/HPE OA-driven script execution
  • Monitor domain controllers for unauthorized network provider registration
  • Validate persistence checks on web servers and sensitive assets

The broader lesson is simple: trusted relationships must be monitored as closely as untrusted ones.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Securitythird-party compromisetrusted relationshipcredential theftMicrosoft Defender

Related Posts

Security

Modern DDoS Attacks: Microsoft’s Defense Guidance

Microsoft says DDoS attacks against consumer web properties are becoming more frequent, stealthier, and increasingly focused on application-layer abuse rather than simple bandwidth floods. The company recommends a defense-in-depth approach using resilient application design, edge protections, telemetry, and Azure services such as DDoS Protection and Web Application Firewall to keep services available under attack.

Security

Dirty Frag Linux Vulnerability Raises Root Risk

Microsoft has warned of active exploitation involving the newly disclosed Dirty Frag Linux local privilege escalation vulnerability, which can help attackers move from a low-privileged account to root. The issue affects kernel networking components such as esp4, esp6, and rxrpc, making it especially important for administrators to review module exposure, restrict local access, and prepare for vendor kernel patches.

Security

AI Agent RCE Flaws in Semantic Kernel Explained

Microsoft Defender researchers disclosed two fixed vulnerabilities in Semantic Kernel that could let prompt injection escalate into host-level remote code execution in AI agents. The findings matter because they show how unsafe tool parameter handling in agent frameworks can turn natural language inputs into code execution paths, raising the stakes for organizations building or securing AI-powered apps.

Security

Microsoft Entra Passkeys: 2026 Passwordless Updates

Microsoft outlined major passkey and account recovery updates across Entra ID, Windows, External ID, and Microsoft Password Manager as part of World Passkey Day. The changes matter for IT teams because they expand phishing-resistant sign-in options, improve recovery security, and continue the retirement of weaker authentication methods such as security questions.

Security

Microsoft AI SOC Report 2026: KuppingerCole Leader

Microsoft says it has been named an Overall Leader and Market Leader in KuppingerCole Analysts’ 2026 Emerging AI Security Operations Center report. The announcement highlights Microsoft’s push beyond traditional SOAR toward AI-driven, agent-assisted security operations in Sentinel and Security Copilot to help SOC teams improve speed, consistency, and scale.

Security

ClickFix macOS Campaign Delivers Infostealers

Microsoft has identified a new ClickFix-style campaign targeting macOS users with fake troubleshooting and utility instructions hosted on blogs and content platforms. Instead of downloading apps, victims are tricked into running Terminal commands that bypass typical macOS app checks and deploy infostealers such as Macsync, SHub Stealer, and AMOS.