<<< Hide Navigation Hide TOC >>>
Discovery Using AzureHound (35b781cc-1a08-4a5a-80af-42fd7c315c6b)
Detects AzureHound (A BloodHound data collector for Microsoft Azure) activity via the default User-Agent that is used during its operation after successful authentication.
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
Discovery Using AzureHound (35b781cc-1a08-4a5a-80af-42fd7c315c6b) | Sigma-Rules | Cloud Service Discovery - T1526 (e24fcba8-2557-4442-a139-1ee2f2e784db) | Attack Pattern | 1 |
Discovery Using AzureHound (35b781cc-1a08-4a5a-80af-42fd7c315c6b) | Sigma-Rules | Cloud Account - T1087.004 (8f104855-e5b7-4077-b1f5-bc3103b41abe) | Attack Pattern | 1 |
Account Discovery - T1087 (72b74d71-8169-42aa-92e0-e7b04b9f5a08) | Attack Pattern | Cloud Account - T1087.004 (8f104855-e5b7-4077-b1f5-bc3103b41abe) | Attack Pattern | 2 |