14 comments

  • kjellsbells 4 hours ago
    Puts me in mind of this scathing report from CISA on how a state-sponsored group broke into Microsoft and then into the State Department and a bunch of other agencies. Reads like a heist movie.

    https://www.cisa.gov/sites/default/files/2024-03/CSRB%20Revi...

    What I found most incredible about the story is that it wasn't Microsoft who found the intrusion. It was some sysadmin at State who saw that some mail logs did not look right and investigated.

    • int0x29 3 hours ago
      Don't worry CISA and any other involved regulator were gutted by DOGE.
    • isodev 2 hours ago
      Ah yes, back when the US actually had cyber defence and experts capable of working in their respective fields.
  • throwoutway 5 hours ago
    Yesterday ProPublica and ArsTechnica published a takedown of Azure: "Federal cyber experts called Microsoft’s cloud a “pile of shit,” approved it anyway" ...

    https://arstechnica.com/information-technology/2026/03/feder...

    • charles_f 4 hours ago
      In which one expert called the documentation provided "a pile of shit", which propublica took the liberty of extending to Azure itself
      • hsbauauvhabzb 3 hours ago
        And they weren’t wrong
        • bulbar 1 hour ago
          They still lied, because they didn't say "X is shit" but "Z said that X is shit", however Z apparently never said that.

          I have become very cautious of such stories for this very reason. Who gets how much blame has a lot to do with "culture" or momentum. Bashing Microsoft for example is always super fine, but at multiple occasions I found the facts to be much more nuanced.

          • hsbauauvhabzb 1 hour ago
            If a slop engine calls a slop company slop, has anyone really lost?
    • int0x29 3 hours ago
      Ars just republished it under license
    • DetroitThrow 3 hours ago
      Every security engineer I know working at Azure is on the verge of self-harm because of the current situation, or is the dumbest IC I've ever met and somebody I think should have never become a security engineer. Sample size ~12.
    • g-b-r 3 hours ago
      Bloomberg and CNBC don't seem to have reported about this, maybe someone with contacts could make them aware?
  • deathanatos 3 hours ago
    IIRC, (& I don't remember if I reported it), but Azure's audit logs don't reflect reality when you delete a client secret from the UI, either.

    If I remember the issue right, we lost a client secret (it just vanished!) and I went to the audit logs to see who dun it. According to the logs, I had done it. And yet, I also knew that I had not done it.

    I eventually reconstructed the bug to an old page load. I had the page loaded when there were just secrets "A" & "B". When I then clicked the delete icon for "B", Azure deleted secrets "B" and "C" … which had been added since the page load. Essentially, the UI said "delete this row" but the API was "set the set of secrets to {A}". The audit log then logged the API "correctly" in the sense of, yes, my credentials did execute that API call, I suppose, but utterly incorrectly in the sense of any reasonable real-world view as to what I had done.

    Thankfully we got it sorted, but it sort of shook my faith in Azure's logs in particular, and a little bit of audit logs in general. You have to make sure you've actually audited what the human did. Or, conversely, if you're trying to reason with audit logs, … you'd best understand how they were generated.

    I don't think I would ever accept audit logs in court, if I were on a jury. Audit logs being hot lies is within reasonable doubt.

    • bulbar 1 hour ago
      That's crazy and a pretty good point.

      The human in the loop doesn't really control what gets done, it only expresses intend to the frontend.

  • ronbenton 5 hours ago
    Bypassing logging feels relatively unimportant compared to some of the recent EntraID vulns we’ve seen
    • ares623 4 hours ago
      It takes a village of exploits to raise a successful and undetected attack.
      • BoredPositron 1 hour ago
        Microsoft standpoint is probably: If it's undetected was there really an attack?
  • epistasis 2 hours ago
    There's a big tradeoff here though: IT admins really love buying Microsoft. And when the dog tries to complain about the dogfood, the dogfood purchaser tends to not understand very well.
    • marcyb5st 1 hour ago
      Isn't it an age thing mostly? Younger admins hate Microsoft with a passion it seems to me. Or is just my circle of acquaintances?
      • owebmaster 24 minutes ago
        Well, as far as my experience, we the old generation despise Microsoft even more
  • strbean 3 hours ago
    Maybe I can use one of these to get in to my organization azure account from my alma mater. The email was deleted right after I graduated, but Microsoft has been trying to bill me (for a reserved IP or something) for close to a decade. Support is useless of course.
  • dfedbeef 2 hours ago
    > It's not often that you see a demo of an actual Azure vulnerability, as they get patched and are gone forever. However, because Microsoft was having trouble replicating this complicated bypass, and asked for a video, I come bearing receipts.

    Absolutely savage lol

    [If you didn't read the thing, it's one curl command.]

  • cyberax 2 hours ago
    Azure Entra is an example of making a system so complex that nobody can understand it entirely. I'm fairly experienced in access control systems, OIDC, crypto, etc. but I was not able to understand how it all fits together.

    Google Cloud is simplistic in comparison. AWS is full of legacy complexity (IAM policies, sigh) but it's fairly self-contained and can be worked around by splitting stuff into accounts.

    I have not looked at Oracle cloud yet. Is it any better than MS?

  • fuckinpuppers 2 hours ago
    It is shocking how absolutely garbage azure is.
  • jiggawatts 1 hour ago
    Reminds me of an Azure Support ticket I submitted a few years ago when some developer clicked the "Fix this now" button in Application Insights, which then proceeded to double the scale of an already too-large App Service Plan. [1]

    The Audit log showed the service identity of Application Insights, not the user that pressed the button! The cloud ops team changed the size back, and then the mysterious anonymous developer... changed it back. We had to have an "all hands" meeting to basically yell at the whole room to cut that out. Nobody fessed up, so we still don't know who it was.

    The Azure Support tech argued with me vehemently that this was by design, that Azure purposefully obscures the identity of users in audit logs!!! He mumbled something about GDPR, which is nonsense, because we're on the opposite side of the planet from Europe.

    At first I was absolutely flabbergasted that anyone even remotely associated with a security audit log design could be this stupid, but then something clicked for me and it all started making sense:

        Entra Id logs are an evolution of Office 365 logs.
    
    Microsoft developed Entra ID (original Azure Active Directory) initially for Microsoft 365, with the Azure Public Cloud platform a mere afterthought.

    They have a legitimate need to protect customer PII, hence the logs don't contain their customers' private information when this isn't strictly necessary. I.e.: Microsoft's subcontractors and outsourced support staff don't need and shouldn't see some of this information!

    The problem was that they re-used the same code, the same architecture decisions, the same security tradeoffs for what are essentially 100% private systems. We need to see who on our payroll is monkeying around with our servers! There is NO expectation of privacy for staff! GDPR does NOT apply to non-European government departments! Etc...

    To this day I still see gaps in their logging where some Microsoft dev just "oops" forgot to log the identity of the account triggering the action. The most frustrating one for me is that Deployments don't log the identity of the user. It's one of only three administrative APIs that they have!

    [1] As an aside: The plan had a 3-year Reservation on it, which meant that we were now paying for the original plan and something twice the size and non-Reserved! This was something like 5x the original cost, with no warning and no obvious way to see from the Portal UI that you're changing away from a Reserved size.

    • Freak_NL 29 minutes ago
      > He mumbled something about GDPR, which is nonsense, because we're on the opposite side of the planet from Europe.

      It was also nonsense because the GDPR is crystal clear about where PII may be used. Audit logs are one of those exceptions where the goal of identifying users simply permits storing usernames and associated attributes (certainly in the case of upgrading a paid plan).

      This wasn't about the GDPR; you were being told to sod off.

  • edition-x 27 minutes ago
    [dead]
  • pastescreenshot 3 hours ago
    [dead]
  • iam_circuit 4 hours ago
    [dead]
  • linzhangrun 2 hours ago
    [dead]