2024 Microsoft Midnight Blizzard
Public-source evidence pattern
Access paths are hierarchical and transitive across cloud, SaaS, and data systems.
Microsoft's public reporting described a modern identity path across a weak legacy identity, OAuth applications, app consent, app-only permission, and mailbox resources.
Microsoft's public guidance from January 2024 describes a path that crossed identity, application, consent, permission, and resource - a chain that no single object on its own would have explained.
The evidence is not only that one legacy non-production account lacked MFA. The evidence is the chain: identity -> OAuth application -> app permission -> mailbox resource.
CISA's Emergency Directive 24-02 reinforced the same lesson at enterprise scale: the risk connected identity, email, credentials, and trust rather than a single isolated configuration row.
Sources