Monday, May 19, 2025
HomeAzureResearchers Turned Azure Storage Wildcards into a Stealthy Internal SOCKS5 Backdoor

Researchers Turned Azure Storage Wildcards into a Stealthy Internal SOCKS5 Backdoor

Published on

SIEM as a Service

Follow Us on Google News

Security researchers at Quarkslab have developed a new covert channel technique that exploits Microsoft’s recommended Azure Storage firewall configurations to bypass network restrictions.

Their proof-of-concept tool, named “ProxyBlob,” leverages Azure Blob Storage to create a SOCKS5 proxy, allowing attackers to establish persistent backdoor access to restricted networks.

Reverse SOCKS over Azure Blob Storage simplified

This technique demonstrates how Microsoft’s own security recommendations for allowing wildcard connections to Azure Blob Storage can be abused to maintain stealthy connections to compromised environments.

- Advertisement - Google News

The Azure Storage Wildcard Vulnerability

During an assumed breach operation for a client, Quarkslab’s security team identified that while most external network connections were blocked, Microsoft services-particularly Azure Blob Storage-remained accessible through a wildcard allow rule.

The researchers discovered that jump boxes used for accessing internal services could reach any Azure Blob Storage container, despite stringent network restrictions.

“We proved that even with restrictions in place, it was still possible to reach the Internet,” notes the researcher.

“This proved that even if the file transfer feature would be disabled, a user could still be able to drop malicious files, from the Internet, on the machine by downloading them from an arbitrary Azure Blob Storage container.”

The vulnerability stems from Microsoft’s own recommendation that organizations configure outbound firewall rules allowing connections to *.blob.core.windows.net for several critical services, including Office 365 and Defender for Endpoint.

This creates an exploitable communication channel that traverses otherwise secure network boundaries.

ProxyBlob: Engineering a Covert Channel

Building on their discovery, the researchers developed ProxyBlob, a reverse SOCKS5 proxy using Azure Blob Storage as its communication medium.

The tool works by establishing a meeting point between a proxy server and an agent via Azure blobs. When a client connects to the proxy server, packets are written to a blob, then read by the agent and forwarded to the target.

ProxyBlob includes sophisticated features such as SOCKS5 protocol support (including TCP/UDP/IPv6), ChaCha20-Poly1305 encrypted data transfer, and multiple agent management through an interactive command-line interface.

While not particularly fast-achieving maximum speeds of around 1.5 Mbps during testing-the researchers note it’s “sufficient to run tools or even to perform an RDP on a remote target within the internal network.”

Security Implications for Enterprise Environments

The research highlights a significant security trade-off in Microsoft’s configuration guidance. According to the researchers, Microsoft’s documentation recommends allowing outgoing connections to *.blob.core.windows.net for at least nine widely-used services.

“This is a serious problem, as anyone can create an Azure storage account and use it to bypass the high network restrictions that follow this ‘recommended configuration,'” the researcher warns.

Published Apps on VDI

Unlike similar tunneling techniques that require specific access methods like RDP, ProxyBlob’s ability to function solely through Azure Blob Storage access makes it particularly concerning for security teams.

The tool enables attackers to establish deep SOCKS tunnels within target networks, facilitating lateral movement even without RDP connections.

Security professionals should reassess their Azure Storage access configurations and implement additional monitoring for suspicious blob storage traffic patterns, especially in highly secured network segments where such access might indicate compromise.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Mayura Kathir
Mayura Kathirhttps://gbhackers.com/
Mayura Kathir is a cybersecurity reporter at GBHackers News, covering daily incidents including data breaches, malware attacks, cybercrime, vulnerabilities, zero-day exploits, and more.

Latest articles

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News

Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...