Cloud Security

Ghost Logins Bypass MFA, Trick SIEMs & SOCs

Forget 'logs don't lie.' A new attack method makes Entra ID 'success' events look legitimate, even if no actual data access occurs. Your SIEM might be shouting 'all clear' while attackers are just messing with the sensors.

{# Always render the hero — falls back to the theme OG image when article.image_url is empty (e.g. after the audit's repair_hero_images cleared a blocked Unsplash hot-link). Without this fallback, evergreens with cleared image_url render no hero at all → the JSON-LD ImageObject loses its visual counterpart and LCP attrs go missing. #}
Abstract representation of network nodes and data flow with question marks and error symbols indicating a deceptive security event.

Key Takeaways

  • Attackers can create 'successful' login events in Entra ID that bypass MFA and conditional access without accessing actual data.
  • This technique, using cross-tenant ROPC, floods SIEMs with false positives, poisoning ML/UEBA models and leading SOC teams on wild goose chases.
  • The real danger isn't direct data theft, but the operational tax on SOC teams, compromised log integrity for audits, and the potential to mask real attacks.

Forget what you thought you knew about cybersecurity logs. For two decades, we’ve operated under the comforting, albeit often blind, faith that Logs don’t lie. Our entire security apparatus—SIEMs, user behavior analytics, automated playbooks—is built on the bedrock of distinguishing a failed login from a successful one. So, what happens when an attacker can forge a sign-in that looks perfectly legitimate in your Entra ID (formerly Azure AD) environment? We’re talking about a successful authentication event that appears to blow past MFA and conditional access policies, all without touching a single byte of your actual data. That’s the unsettling reality Varonis Threat Labs has uncovered, and frankly, it’s the kind of thing that keeps this old hand up at night. The immediate threat might not be data theft, but the downstream consequences for your security operations, your budget, and the very integrity of your data records? Those are considerably more insidious.

Cross-Tenant ROPC: The Log Without a Login

The trick, as it turns out, hinges on a specific nuance within the Resource Owner Password Credentials (ROPC) protocol and a ‘cross-tenant’ architecture. Here’s the gist: an attacker gets their hands on a valid username and password for your organization (let’s call it Tenant A). Normally, your strong MFA or legacy protocol blocks would slam the door shut. But this attack vector is clever. Instead of trying to log into Tenant A directly, the attacker uses those same credentials to authenticate against a different, far more permissive tenant (Tenant B).

Here’s where it gets messy.

Your tenant (Tenant A), the one being targeted, verifies the password. Boom. That generates a ‘Sign-in: Success’ event. Meanwhile, the other tenant (Tenant B), the one the attacker is actually talking to, checks its own Conditional Access policies. Since Tenant B has no beef with this user or these credentials, the authentication sails through. The end result? Your SIEM lights up like a Christmas tree, proudly proclaiming a successful login, seemingly bypassing all your hard-won defenses. To many monitoring tools, it’s a done deal. User logged in, no problems. Except, of course, there are now massive problems.

Poisoning the Well: The Real Danger

Even though the attacker isn’t directly accessing your files because they’re stuck in Tenant B, the implications for your security posture are, shall we say, deeply concerning. Confusion is an attacker’s best friend in this modern security circus.

So, how does this poison the well?

First, consider your User and Entity Behavior Analytics (UEBA) and machine learning models. These systems are designed to learn what ‘normal’ looks like. By flooding your logs with thousands of these fake ‘successful’ logins—from obscure geolocations, from IPs you’ve never seen before, at impossible speeds—an attacker effectively trains your models to ignore actual threats. Imagine your system flags a user logging in from 50 different countries in an hour as just another anomaly, rather than a critical indicator of compromise. It creates so much noise, it completely masks the real attack happening in the shadows. Worse, security controls might start reacting to these phantom alerts, potentially disrupting critical production systems based on data that has no basis in reality.

The SOC Tax: Blood, Sweat, and Tears for Ghosts

Every single one of these false positives has a price tag, and it’s paid in analyst time and budget. A security analyst spots a ‘successful’ login from a notoriously bad IP. What happens? They spring into action. The CISO gets a frantic call. The user account gets disabled. Hours upon hours are poured into investigating a breach that, technically speaking, never actually occurred. An attacker can automate this. Script it. Flood your systems with thousands of these ‘ghost logins’ every day. It’s not just annoying; it’s a sophisticated Denial-of-Service attack specifically targeting your most valuable, and most expensive, resource: your human analysts. You’re forced to burn budget and manpower chasing phantoms.

Compliance nightmares? Oh, you bet.

How do you explain to an auditor that your logs show 500 ‘successful’ logins from user X, all without MFA, even though MFA is supposed to be enforced on every single account? Your log integrity? Kaput. You’re no longer looking at a true record of events, but a warped, manipulated version of reality. And that, my friends, is a compliance officer’s worst-case scenario.

Varonis did the right thing, reporting this to Microsoft. And bless their hearts, Microsoft assessed it as ‘low severity.’ Their reasoning? No actual data access, no direct compromise. From a purely technical, resource-access perspective, I get it. But from the trenches? For a CISO trying to manage a SOC, for an auditor trying to verify your security, the severity is anything but low.

From a SOC and audit perspective, the concern remains significant: defenders may still interpret these events as evidence of meaningful access, triggering investigations, alerts, and incident-response workflows based on telemetry that does not necessarily reflect resource compromise.

The stark truth is this: Static logs are no longer enough. Many vendors, and indeed Microsoft, look at ROPC and see ‘low severity’ because no data was directly exfiltrated. But the real danger lies in the context—or rather, the complete lack thereof. We need to stop asking, ‘Did they log in?’ and start asking the hard questions: ‘Did they access data?’ ‘Did they access a resource inside our tenant?’ If your security tools are only watching the front door, they can be easily fooled by a fake doorbell ring. You need to know what’s happening inside the house.

So, the next time you’re building a SIEM rule, or reviewing an alert, sprinkle a little intellectual salt on those authentication logs. They’re not always as honest as they appear.

Why Does This Matter for My SOC?

This cross-tenant ROPC attack is a direct assault on the operational efficiency and accuracy of your Security Operations Center. It weaponizes the very data your SOC relies on to detect and respond to threats. By generating thousands of ‘successful’ logins that bypass your primary authentication controls (MFA, Conditional Access) but don’t grant access to actual data, attackers create a flood of false positives. This forces your SOC analysts to spend valuable time investigating non-existent incidents, draining resources and budget. Furthermore, it corrupts your UEBA and ML models by feeding them deceptive data, potentially masking real threats by making them appear as normal activity. Ultimately, this technique isn’t about stealing data directly; it’s about crippling your ability to detect when data is truly at risk.

Will This Replace My Job?

No, this specific attack method won’t directly replace your job, but it will absolutely make your job harder and potentially make your existing tools less effective if not properly addressed. The goal of these ‘ghost logins’ is to overload and confuse your security team and systems, not to eliminate them. The core work of a security analyst—investigation, threat hunting, incident response—remains critical. However, this attack highlights the need for more sophisticated detection methods that go beyond simple ‘login success/failure’ metrics. You’ll need to focus on verifying actual resource and data access within your tenant, not just the authentication event itself. This means investing in and configuring tools that provide deeper visibility and context, and potentially adapting your threat hunting strategies to look for patterns of deception rather than just direct unauthorized access.


🧬 Related Insights

Frequently Asked Questions

What does Resource Owner Password Credentials (ROPC) protocol do? ROPC is a legacy authentication flow where an application directly handles a user’s username and password. It’s generally considered less secure than modern protocols like OAuth or OpenID Connect because it can expose credentials more directly to applications and doesn’t inherently support multi-factor authentication (MFA) easily.

How does this cross-tenant attack work in Entra ID? An attacker uses valid user credentials to authenticate against a different tenant (Tenant B) than their home tenant (Tenant A). Tenant A logs this as a ‘success’ because the password is valid, even though Tenant B’s policies are what ultimately allow the (limited) authentication flow. This creates a deceptive ‘successful login’ log in Tenant A without granting access to Tenant A’s data or resources.

Why is Microsoft calling this low severity? Microsoft’s assessment likely focuses on the direct impact: no user data or tenant resources are compromised. From their perspective, the primary goal of security is to prevent unauthorized access to data and services. Since that hasn’t happened, the immediate risk is deemed low. However, the article argues the impact on SOC operations, auditability, and the potential to mask real attacks makes it a significant concern for defenders.

Written by
Threat Digest Editorial Team

Curated insights, explainers, and analysis from the editorial team.

Frequently asked questions

What does Resource Owner Password Credentials (ROPC) protocol do?
ROPC is a legacy authentication flow where an application directly handles a user's username and password. It's generally considered less secure than modern protocols like OAuth or OpenID Connect because it can expose credentials more directly to applications and doesn't inherently support multi-factor authentication (MFA) easily.
How does this cross-tenant attack work in Entra ID?
An attacker uses valid user credentials to authenticate against a *different* tenant (Tenant B) than their home tenant (Tenant A). Tenant A logs this as a 'success' because the password is valid, even though Tenant B's policies are what ultimately allow the (limited) authentication flow. This creates a deceptive 'successful login' log in Tenant A without granting access to Tenant A's data or resources.
Why is Microsoft calling this low severity?
Microsoft's assessment likely focuses on the direct impact: no user data or tenant resources are compromised. From their perspective, the primary goal of security is to prevent unauthorized access to data and services. Since that hasn't happened, the immediate risk is deemed low. However, the article argues the impact on SOC operations, auditability, and the potential to mask real attacks makes it a significant concern for defenders.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Varonis Blog

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.