Query Details
// Detect Copilot Exfiltration arises from AiTM Token Theft // https://www.linkedin.com/posts/activity-7217887769744793601-JUeb/ // Identify token theft through AiTM phishing attacks, where stolen tokens are exploited for Copilot activities involving data summarization and extraction from a "non-malicious" IP. Leverage Sentinel Behavior Analytics to detect initial logins from new ISP with investigation score set (potentially threat actors) and correlate this IP data with Copilot activities from CloudAppEvents. This KQL is primarily targeted at threat actors using clean IP to perform Copilot exfiltration. let FirstTimeUserConnectedISPIP = BehaviorAnalytics | where TimeGenerated > ago(7d) // Behaviour Analytics detecting user first time connected to a new ISP | where tostring(ActivityInsights.FirstTimeUserConnectedViaISP) == "True" | where ActivityType == "LogOn" | where SourceDevice == "" // Non-corporate endpoint | where InvestigationPriority > 0 // Suspicious Session | project SourceIPAddress; CloudAppEvents | where ActionType == "CopilotInteraction" // Correlating copilot activities from the new ISP IP | where IPAddress has_any(FirstTimeUserConnectedISPIP)
This KQL query is designed to detect potential data exfiltration activities involving Microsoft's Copilot feature, which may arise from token theft through AiTM (Adversary-in-the-Middle) phishing attacks. Here's a simplified breakdown:
Identify Suspicious Logins:
Extract IP Addresses:
Correlate with Copilot Activities:
In essence, this query aims to detect if threat actors are using stolen tokens to perform unauthorized Copilot activities from seemingly clean IP addresses.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators