Cloud Espionage in the Crosshairs: How Murky Panda Is Weaponizing Entra ID Trust
- Patrick Duggan
- Aug 29, 2025
- 2 min read
The Problem: Cloud Trust & Tech Debt Is Being Weaponized
In a chilling escalation of cloud-native espionage, Chinese threat actor Murky Panda (aka Silk Typhoon) has shifted tactics from zero-day exploitation to abusing trusted relationships in Microsoft Entra ID tenants. The group has been observed compromising upstream suppliers and using their administrative access to inject backdoor accounts and hijack service principals—all without triggering traditional security controls.
This isn’t just a supply chain problem. It’s a cloud control plane compromise, and it’s happening in live environments.
Attack Anatomy
Initial Access: Exploits like CVE-2023-3519 (Citrix) and CVE-2025-3928 (Commvault)
Persistence: Web shells (neo-reGeorg) and custom malware (CloudedHope)
Privilege Abuse: Creation of temporary Entra ID accounts with elevated roles
Service Principal Hijack: Backdooring existing app identities tied to AD and email
Stealth: Timestamp manipulation, indicator deletion, and SOHO exit nodes
Murky Panda isn’t alone. Genesis Panda is querying Instance Metadata Services (IMDS) to extract credentials and pivot laterally, while Glacial Panda is targeting legacy telecom stacks with trojanized OpenSSH binaries.
The common thread? Cloud-native blind spots—especially in identity governance, legacy protocol exposure, and trust boundaries.
The Solution: Entra ID Hardening Checklist
Mapped to NIST SP 800-53 Rev. 5 | Based on Microsoft’s secure architecture guidance
🔐 Control Area | NIST Control | Action Item | Urgency |
Access Control | AC-2, AC-3, AC-5 | Disable legacy auth protocols (SMTP, POP3, IMAP4, BAV2ROPC) | 🔥 Immediate |
AC-6 | Enforce least privilege on service principals | 🔒 Critical | |
AC-17 | Apply Conditional Access to all identities (users + workloads) | 🛡️ High | |
Identification & Authentication | IA-2, IA-5 | Enforce MFA and passwordless auth (FIDO2, TAP) | 🚨 Non-negotiable |
IA-9 | Monitor non-interactive sign-ins and app-only tokens | 👀 Continuous | |
Audit & Accountability | AU-2, AU-6 | Enable sign-in logs and audit service principal activity | 📊 Daily |
AU-12 | Integrate with Sentinel and Defender for Identity | 🧠 Smart move | |
System & Communications Protection | SC-12, SC-28 | Rotate secrets/certs for service principals regularly | 🔁 Scheduled |
SC-7 | Restrict partner org access and enforce trust boundaries | 🧱 Structural | |
Configuration Management | CM-2, CM-6 | Use managed identities instead of service principals | 🧰 Modernize |
Risk Assessment | RA-5 | Simulate attacks with EntraGoat or Red Team tooling | 🧪 Proactive |
Playbook: Responding to Entra ID Abuse
Legacy Auth Exploitation
Detect: Sign-in logs show legacy protocol usage
Contain: Block via Conditional Access immediately
Remediate: Rotate credentials, enforce MFA, notify users
Recover: Validate policy coverage and disable fallback methods
Service Principal Hijack
Detect: App-only sign-ins from unknown IPs or odd hours
Contain: Revoke credentials, disable compromised principal
Remediate: Audit permissions, rotate secrets, apply workload identity policies
Recover: Revalidate app registrations and enforce secure ownership
Final Word
This isn’t a theoretical risk—it’s an active campaign. If your Entra ID tenant isn’t hardened against these tactics, you’re not just vulnerable—you’re already late. The time to act is now.
