Restless Guests: The Hidden Entra Risk That Could Compromise Your Cloud



It starts with something most organisations see as low-risk a guest account invited into your Microsoft Entra environment.

But that invitation could open the door to a hidden, high-risk attack path you didn’t even know existed.

🧠 The Unexpected Attack Surface

Researchers have discovered a little-known flaw in how Microsoft Entra handles subscriptions and billing roles. It allows a guest user to create and transfer subscriptions into your tenant while retaining full ownership of them.

Here’s how it works:

  • Guest is invited into your Entra ID tenant
  • They use their own billing role from their home tenant to create a subscription
  • They transfer that subscription into your tenant
  • Now they’re the owner inside your environment

And most Azure admins have no visibility of this via standard Entra permission reviews.

🔓 What Can a Guest Do with Subscription Access?

Once inside, a “restless guest” can:

  • Access and expose high-privilege account info
  • Modify or disable Azure security policies
  • Create persistent user-managed identities
  • Register fake compliant devices to bypass conditional access

This isn’t hypothetical. It’s already being exploited in the wild — and it’s often completely off the security radar.

💡 Why Most Security Teams Miss This

Most Azure teams focus on Entra Directory Roles and Azure RBAC Roles. But this attack uses billing account permissions, which live outside the usual access control perimeter.

Plus, by default, any user even a guest can invite others. A compromised user could invite an attacker with the right permissions and bypass your defences completely.

✅ Mitigations You Can Apply Now

  • 🛑 Block guest-created subscriptions: Use Microsoft’s Subscription Policy settings
  • 👤 Audit all guest users and remove those no longer needed
  • 🔒 Harden guest permissions and disable guest-to-guest invites
  • 🕵️‍♂️ Monitor all subscriptions for unknown guest-created resources
  • 📱 Check conditional access and device compliance rules

🔍 Final Word

The idea that “guests don’t pose a serious risk” no longer holds. If you use Microsoft Entra especially in a B2B scenario it’s time to rethink guest access and billing visibility.

💬 Have you reviewed your Entra guest policies recently?

👉 Need help spotting hidden attack paths? Follow TheCyberGuyAU for straight-talk security insights.

Comments

Most Viewed

Qantas Breach: 6 Million Customers at Risk in Major Cyber Attack

Key Reforms Under the Privacy and Other Legislation Amendment Act 2024

The Cloud Computing Revolution: Unleashing the Power of the Cloud

OAuth Attacks: How Malicious Apps Are Targeting Microsoft 365 and GitHub