Threat hunt: Unauthorized TOR usage

Threat hunt: Unauthorized TOR usage

Conducted an in-depth threat hunt using Microsoft Defender and KQL to detect, analyze, and respond to unauthorized TOR browser usage within an enterprise environment.

Technologies Used

Microsoft Defender Azure KQL

Key Features

Developed custom KQL queries to detect TOR traffic patterns
Performed forensic file and process analysis
Identified unauthorized activities through network event correlation
Established chronological event timelines
Implemented endpoint isolation procedures

Project Overview

This threat hunting initiative was launched in response to concerns about unauthorized access to restricted websites and unusual encrypted network traffic patterns. After employee reports indicated potential TOR browser usage to bypass security controls, I conducted a thorough investigation on workstation server-dev-01 to detect TOR installation and usage, assess security risks, and determine appropriate mitigation measures.

Technical Implementation

The investigation leveraged Windows 10 Virtual Machines in Microsoft Azure and Microsoft Defender for Endpoint as the EDR platform. I developed a multi-layered detection approach using Kusto Query Language (KQL) to analyze:

  • File Event Analysis: Identified TOR installer downloads and related file activities
  • Process Execution Analysis: Detected silent installation commands and TOR browser launches
  • Network Connection Analysis: Discovered connections to known TOR exit nodes

The investigation confirmed that user cdoles.admin had downloaded, installed, and utilized TOR Browser on the workstation, establishing connections to known TOR nodes. In response, I immediately enforced endpoint isolation and escalated the incident to management.

Completed on: Feb 25, 2025