Cookie Crumbles: Azure Entra ID’s Sweet Deal for Cyberattackers!
Attackers can use the “Cookie Bite” method to exploit Entra ID session cookies, bypassing MFA and gaining unauthorized access to Microsoft 365 resources. These cookies are the “keys to the kingdom,” making it easy for cybercriminals to impersonate users and wreak havoc. Organizations must improve login security to prevent this digital cookie theft.

Hot Take:
Who needs a magic wand when you have cookies? In the digital kingdom of Azure Entra ID, hackers are pulling a Hansel and Gretel, using cookies to find their way into your precious data and play a game of cyber thrones. Who knew the path to persistent access was paved with crumbs?
Key Points:
- Researchers at Varonis Threat Labs discovered a new attack vector called “Cookie Bite” targeting Azure Entra ID.
- The attack exploits two authentication cookies, ESTSAUTH and ESTSAUTHPERSISTENT, to bypass MFA and hijack user sessions.
- Hackers can gain persistent access to Microsoft 365 resources like Outlook and Teams, leading to potential cyberattacks.
- The attack uses a browser extension and PowerShell automation to steal session cookies and evade detection.
- Organizations are encouraged to enhance login enforcement and monitor user behavior to thwart such attacks.
Already a member? Log in here