Azure Storage unusual spike in destructive operations
이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Detect an unusual spike in destructive operations against Azure Storage resources.
Strategy
This rule monitors Azure Storage logs for anomalous levels of deletion events including MICROSOFT.STORAGE/STORAGEACCOUNTS/DELETE, DeleteContainer, and DeleteBlob operations with a successful outcome. A spike significantly above baseline may indicate a compromised account performing mass data destruction, which is a common pattern in cloud ransomware attacks.
Triage and response
- Review the volume and scope of deletion operations performed from`{{@network.client.ip}}` to assess the extent of potential data loss.
- Examine what specific storage accounts, containers, or blobs were targeted to understand the blast radius.
- Check for other suspicious activity from the same user.
- If the activity is not authorized, begin your organization’s incident response plan.