- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Classification:
attack
Tactic:
Technique:
Set up the azure integration.
Detect when an account lists keys outside of the standard web applications for Azure AI and ML services.
Monitor Azure activity logs for when an account lists keys do not come from known web applications for the Azure Portal or ML, AI, or OpenAI Studio. This may indicate an attacker listing keys with compromised Azure tokens through the Azure CLI, direct web requests, or other tooling. Compromised keys may be used in attacks such as LLM hijacking (LLMjacking). The following application identifiers has been excluded:
d7304df8-741f-47d3-9bc2-df0e24e2071f
(ML Studio)cb2ff863-7f30-4ced-ab89-a00194bcf6d9
(AI Studio)dc807dec-d211-4b3f-bc8a-43b3443c4874
(Open AI Studio)c44b4083-3bb0-49c1-b47d-974e53cbdf3c
(Azure Portal)4e09c6ac-4372-45b7-a977-e9f89e673e32
(Speech Studio){{@identity.claims.appid}}
in the Enterprise Application section of Microsoft Entra to gather further context about the application used.