MCADDF

[REALWORLD-019]: Scattered Spider IdP TTP (Federated IdP and Additional Cloud Credentials)

1. METADATA HEADER

Attribute Details
Technique ID REALWORLD-019
MITRE ATT&CK v18.1 T1098.003 (Account Manipulation: Additional Cloud Roles); T1484.002 (Domain or Tenant Policy: Trust Modification); T1556.007 (Modify Authentication Process: Hybrid Identity)
Tactic Initial Access; Privilege Escalation; Persistence; Defense Evasion; Credential Access
Platforms Cross‑Cloud (Entra ID, Okta, AWS, GCP, SaaS IdPs)
Severity Critical
CVE N/A
Technique Status ACTIVE
Last Verified 2026-01-10
Affected Versions Modern IdPs and cloud providers targeted by Scattered Spider / UNC3944 / Octo Tempest (Entra ID, Okta, AWS IAM, GCP IAM, major SaaS)
Patched In Not applicable; mitigated by identity governance, strong helpdesk and MFA processes, and hardened federation controls
Author SERVTEPArtur Pchelnikau

2. EXECUTIVE SUMMARY

Operational Risk

Compliance Mappings

Framework Control / ID Description
CIS Benchmark CIS controls for Entra ID, Okta, AWS IAM Hardening admin roles, MFA, and federation aligns with CIS identity baselines.
DISA STIG Identity and Access Management STIGs Mandate strong controls for privileged identities and SSO systems.
CISA SCuBA Identity, SaaS, and cloud baselines Directly addresses identity‑centric threats such as UNC3944 / Scattered Spider.
NIST 800-53 AC-2, AC-5, AC-6, IA-2, IR-4 Account management, separation of duties, least privilege, strong auth, and incident response.
GDPR Art. 32 Security of processing; IdP compromise routinely leads to mass personal data exposure.
DORA Art. 9, 10 Operational resilience for identity infrastructure in financial services.
NIS2 Art. 21 Cyber risk management including modern identity‑centric threats.
ISO 27001 A.5.15, A.5.16, A.8.2, A.8.3 Access control, identity management, and secure authentication.
ISO 27005 Identity Provider Takeover Risk scenario: adversary takes control of IdP and cloud IAM to orchestrate full‑stack compromise.

3. TECHNICAL PREREQUISITES

Supported Versions:

4. ENVIRONMENTAL RECONNAISSANCE

Identity Posture and Admin Surface

Key defensive reconnaissance (Blue Team) to evaluate risk exposure to Scattered Spider‑style operations:

Example Entra ID role enumeration:

Connect-MgGraph -Scopes 'Directory.Read.All','RoleManagement.Read.All'
Get-MgRoleManagementDirectoryRoleDefinition |
  Where-Object {$_.DisplayName -like '*Admin*'} |
  Select-Object DisplayName, Id

Okta / Entra Federation and Inbound IdP Recon

5. DETAILED EXECUTION METHODS AND THEIRS STEPS

METHOD 1 – Helpdesk‑Driven Account Takeover and MFA Reset

Supported Versions: Any organisation with helpdesk‑mediated MFA or password reset.

Step 1: Collect Target Identity Data

Objective: Gather enough information to pass helpdesk identity verification.

Execution:

Step 2: Social‑Engineer Helpdesk

Objective: Convince support to reset MFA and/or password for high‑value accounts.

Execution:

METHOD 2 – Adding Federated IdP and Automatic Account Linking (Okta / Entra ID)

Supported Versions: Okta inbound federation; Entra cross‑tenant access and external IdPs.

Step 1: Obtain IdP Admin Rights

Objective: Get Super Admin in Okta or Global Admin in Entra ID.

Execution:

Step 2: Add Attacker‑Controlled IdP

Objective: Configure a new SAML or OIDC IdP pointing to attacker infrastructure.

Portal Steps (generic):

  1. Log into IdP admin console as administrator.
  2. Navigate to Identity Providers or federation settings.
  3. Add new IdP with attacker‑controlled endpoints and certificate.
  4. Configure username mappings to match existing user identifiers.
  5. Enable Just‑in‑Time provisioning or automatic account linking.

Result:

Step 3: Assign Additional Cloud Roles (T1098.003)

Objective: Grant persistent high‑privilege roles to attacker‑controlled or compromised accounts.

Example Entra ID role assignment (legitimate cmdlet, attacker misuse):

Connect-MgGraph -Scopes 'RoleManagement.ReadWrite.Directory'
$role = Get-MgRoleManagementDirectoryRoleDefinition -Filter "displayName eq 'Global Administrator'"
New-MgRoleManagementDirectoryRoleAssignment -PrincipalId <attacker-object-id> -RoleDefinitionId $role.Id -DirectoryScopeId '/'

Result:

6. ATTACK SIMULATION AND VERIFICATION (Atomic Red Team)

7. TOOLS AND COMMANDS REFERENCE

8. SPLUNK DETECTION RULES

Rule: Sudden Assignment of High‑Privilege Cloud Roles

index=azure sourcetype="azure:monitor:aad" \
  Operation="Add member to role" OR Operation="Add directory role member"
| search TargetResources.roleName IN("Global Administrator","Privileged Role Administrator","User Access Administrator")
| stats values(TargetResources) as targets, values(InitiatedBy) as actors by Operation, TimeGenerated

9. MICROSOFT SENTINEL DETECTION

Query: Entra ID High‑Privilege Role Assignment and Federation Changes

AuditLogs
| where OperationName in (
    'Add member to role',
    'Add directory role member',
    'Add identity provider',
    'Set federation settings on domain',
    'Set domain authentication'
  )
| project TimeGenerated, OperationName, InitiatedBy, TargetResources, ModifiedProperties

10. WINDOWS EVENT LOG MONITORING

11. SYSMON DETECTION PATTERNS

12. MICROSOFT DEFENDER FOR CLOUD

13. MICROSOFT PURVIEW (UNIFIED AUDIT LOG)

14. DEFENSIVE MITIGATIONS

15. DETECTION AND INCIDENT RESPONSE

Step Phase Technique Description
1 Initial Access Social engineering, SIM swapping Obtain initial account access.
2 Privilege Escalation T1098.003 Additional Cloud Roles Elevate permissions to IdP and cloud admin.
3 Current Step REALWORLD-019 – Scattered Spider IdP TTP Abuse IdP federation and IAM to maintain access.
4 Persistence Federation backdoors, added MFA devices Long‑term tenant access.
5 Impact Data theft, ESXi compromise, ransomware Monetise access through extortion.

17. REAL-WORLD EXAMPLES