M365 Suspect Power Automate Activity

M365 Suspect Power Automate Activity

Detection overview

The "M365 Suspect Power Automate Activity" detection identifies potentially unauthorized or unusual activities involving Microsoft Power Automate, an Office 365 tool used to create automated workflows. This detection helps identify when Power Automate is used for data exfiltration, automation of attack mechanisms, or actions that bypass typical user policies.

Triggers

  • Abnormal Power Automate activity was observed from a user in the environment.
  • A user leveraged a Power Automate flow connector that was unusual for either the user or the environment.
  • A user modified another user existing flow in a suspect manner.

Possible Root Causes

  • An attacker may be creating automated tasks within the environment to secretly exfil, manipulate data for impact, or create network control channels.
  • A normal user is attempting to subvert normal IT policies by leveraging native Microsoft infrastructure without authorization.
  • One of a small set of users who are authorized to leverage Power Automate flow was observed doing so.

Business Impact

  • Power Automate, Microsoft’s native and on-by-default O365 automation tool, can be leveraged by attackers to interact directly with internal data and infrastructure to facilitate data exfil or attack automation.

Steps to Verify

  • Power Automate activities involving unauthorized connectors should be investigated immediately.
  • Users modifying other user’s Power Automate flows should have explicit permission to do so.
  • Users authorized for Power Automate activities should be explicitly triaged to avoid future detections.
M365 Suspect Power Automate Activity

Possible root causes

Malicious Detection

An attacker who has gained access to an account may create or alter Power Automate flows to facilitate data exfiltration, automate repetitive attack actions, or establish control channels that allow for persistence and lateral movement. This tactic bypasses standard monitoring tools and can interact directly with internal data and services.

Benign Detection

In legitimate scenarios, users might create or adjust Power Automate workflows as part of regular business operations, such as automating report generation or integrating different applications. However, unusual usage patterns or unauthorized use can raise alerts, especially if it deviates from normal user behavior.

M365 Suspect Power Automate Activity

Example scenarios

1. Unauthorized flow creation for data transfer

An attacker modifies an existing Power Automate workflow to send data to an external service, disguising it as part of normal business operations.

2. Internal user testing security limits

A user without sufficient authorization creates complex flows that trigger security mechanisms, prompting an investigation.

M365 Suspect Power Automate Activity

Business impact

If this detection indicates a genuine threat, the organization faces significant risks:

Data Exfiltration Risk

Malicious Power Automate flows can enable attackers to transfer sensitive information outside the organization, leading to data breaches.

Operational Integrity Threats

Power Automate workflows manipulated by an attacker can impact the organization by automating harmful actions, such as sending misleading communications or changing data.

Increased Persistence Opportunities

The ability to automate and schedule tasks provides attackers a foothold for maintaining long-term access.

M365 Suspect Power Automate Activity

Steps to investigate

FAQs

Why is Power Automate used maliciously?

How can I determine if Power Automate use is legitimate?

What should I do if suspicious activity is detected?

Can benign users trigger this detection?

Are logs available for Power Automate activity?

Is there a way to prevent unauthorized Power Automate usage?

What types of data are most at risk?

Can Power Automate be used for command execution?

Is this detection part of a larger threat?

What tools can detect and mitigate these actions?