Microsoft 365 Admins Locked Out of Tenant After Attacker Removes All Global Admin Roles

Business-Critical Incident: Attacker Achieves Tenant Lockout by Removing All Microsoft 365 Global Administrators

CRITICAL
April 14, 2026
7m read
Security OperationsCyberattackCloud Security

Related Entities

Organizations

Full Report

Executive Summary

An organization has suffered a complete administrative lockout from its Microsoft 365 tenant after a threat actor compromised an administrative account and then maliciously removed the 'Global Administrator' role from all other privileged users. This devastating attack left the organization's IT staff unable to access critical management portals, including the Microsoft 365 Admin Center and Microsoft Entra ID. The incident, described by the victim as a "business-critical security incident," effectively paralyzes identity management, security, and compliance functions. This scenario, known as a 'tenant lockout,' is a worst-case scenario for cloud administrators and underscores the critical need for emergency access controls and robust monitoring of privileged role assignments.

Threat Overview

The attack is a simple but highly effective method for an attacker to escalate and maintain control after an initial compromise.

Attack Chain:

  1. Initial Compromise: The attacker first gains access to a single account with the Global Administrator role. This is typically achieved through phishing, password spraying, or exploiting the lack of Multi-Factor Authentication (MFA).
  2. Privilege Escalation / Defense Evasion: The attacker logs into the Microsoft Entra ID portal.
  3. Execution: The attacker navigates to the 'Roles and administrators' section and systematically removes the Global Administrator role assignment from every other user account, including the one they originally compromised to cover their tracks.
  4. Impact: The organization is now completely locked out. No legitimate user has the permissions necessary to manage the tenant, reset passwords, or restore the removed roles. The attacker may retain access through a backdoor account they created or may simply leave the organization in a state of chaos.

The organization's only recourse is to contact the Microsoft Data Protection team via phone, a process that involves a lengthy identity and tenant ownership verification procedure before access can be restored.

Technical Analysis

This attack abuses legitimate administrative functionality. The key TTPs are:

  • Valid Accounts: Cloud Accounts: T1078.004 - Cloud Accounts - The entire attack hinges on first obtaining access to a legitimate Global Admin account.
  • Cloud Administration Command: T1098.001 - Cloud Administration Command - The attacker uses standard Entra ID portal functions or PowerShell commands (Remove-MsolRoleMember or similar) to modify role assignments.
  • Impair Defenses: Disable or Modify Tools: T1562.001 - Disable or Modify Tools - By removing all other administrators, the attacker is impairing the organization's primary defensive tool: its own IT staff.

Impact Assessment

  • Business Paralysis: Without administrative access, the organization cannot manage user accounts, respond to security alerts, configure applications, or manage compliance. Business operations can grind to a halt.
  • Significant Downtime: The process of regaining access through Microsoft support can be slow and arduous, leading to extended periods of administrative downtime and lost productivity.
  • High Risk of Further Damage: During the lockout period, the attacker may have free rein within the tenant to exfiltrate data, deploy malware via SharePoint, or send phishing emails from trusted internal accounts.
  • Loss of Confidence: Such an incident severely undermines confidence in the IT department's ability to secure critical cloud infrastructure.

Cyber Observables for Detection

Detection must be real-time, as the attack can be executed in minutes.

Type Value Description
log_source Microsoft Entra ID Audit Logs The critical log event is Remove member from role. Monitor for this action, especially when it targets the 'Global Administrator' role.
event_id Directory-Role-Member-Removed This is the specific activity name in the audit logs that corresponds to the malicious action.
user_account_pattern Anomalous login to a Global Admin account A Global Admin account logging in from an unfamiliar IP, country, or device is a precursor and a critical alert.

Detection & Response

  • D3FEND: Domain Account Monitoring: This is the most critical defense. Configure a high-priority, non-ignorable alert in your SIEM or Microsoft Sentinel that triggers immediately whenever a member is removed from the Global Administrator role. The alert should be sent to multiple people via multiple channels (email, SMS, Teams). This is a direct application of D3-DAM: Domain Account Monitoring.
  • Real-Time Alerts: The alert rule should be something like: AzureActivity | where OperationNameValue == 'Microsoft.Directory/roleManagement/directory/roleAssignments/delete' and properties_roleDefinitionId_g == '62e90394-69f5-4237-9190-012177145e10'. This rule specifically targets the removal of the Global Admin role.
  • Automated Response: If possible, use a SOAR playbook to respond to the alert by attempting to re-add the user to the role or by temporarily disabling the account that performed the action.

Mitigation

CRITICAL MITIGATION: Implement Emergency Access or 'Break-Glass' accounts.

  • Break-Glass Accounts: Create two or more emergency access accounts that are excluded from all standard policies (like MFA requirements, conditional access). These accounts should have the Global Administrator role. Their credentials should be extremely complex and stored securely offline (e.g., in a physical safe). They are to be used only in an emergency, like this lockout scenario. This is the single most important mitigation and is a core part of M1026 - Privileged Account Management.
  • Enforce MFA on All Admins: All standard administrative accounts (and all users) must have phishing-resistant MFA enforced. This would have likely prevented the initial compromise.
  • Privileged Identity Management (PIM): Use Microsoft Entra ID PIM. This feature ensures that administrators do not have standing, persistent access. They must request and justify temporary elevation to the Global Admin role (Just-In-Time access), which is logged and can require approval. This dramatically reduces the window of opportunity for an attacker.
  • Limit Number of Global Admins: Adhere to the principle of least privilege. Most administrators do not need standing Global Admin rights. Use more granular roles (e.g., Exchange Admin, Teams Admin) for daily tasks and keep the number of Global Admins to a bare minimum (e.g., 2-4 plus break-glass accounts).

Timeline of Events

1
April 13, 2026
User reports the tenant lockout incident on a Microsoft technical support forum.
2
April 14, 2026
This article was published

MITRE ATT&CK Mitigations

Implement emergency access ('break-glass') accounts and use Privileged Identity Management (PIM) for just-in-time access.

Enforce phishing-resistant MFA on all administrative accounts to prevent the initial compromise.

Audit

M1047enterprise

Configure and monitor high-priority, real-time alerts for any changes to Global Administrator role assignments.

D3FEND Defensive Countermeasures

To prevent a tenant lockout, real-time Domain Account Monitoring is non-negotiable. Organizations must configure a high-severity, real-time alert in their SIEM (like Microsoft Sentinel) that triggers the instant a user is removed from the 'Global Administrator' role in Microsoft Entra ID. This is not a routine event and should be treated as a critical security incident until proven otherwise. The alert should not just be an email; it should trigger multiple notification channels (SMS, phone calls, dedicated Teams/Slack channel) to a distribution list of security personnel and IT leadership. This ensures that even if the attack happens at 3 AM, key personnel are woken up and can respond immediately. The alert provides the crucial, time-sensitive signal needed to intervene before an attacker can remove all admins and achieve a full lockout.

The most effective proactive control against this attack is implementing Microsoft Entra Privileged Identity Management (PIM). PIM shifts from a model of 'standing access' to 'just-in-time' (JIT) access. Instead of having accounts that are always Global Admins, administrators are made 'eligible' for the role. To become a Global Admin, they must go through an activation process in PIM, which can require providing a justification, getting approval from another manager, and passing an MFA challenge. The role is then granted only for a limited time (e.g., 4 hours). This dramatically shrinks the window of opportunity for an attacker. If they compromise an account, it likely won't have standing Global Admin rights. And if they try to activate PIM, it creates a clear, auditable trail and can be subject to an approval workflow, giving defenders a chance to stop the attack before it even starts.

Sources & References

Security Incident – Global Administrator Access Compromised / Removed
Microsoft Learn (learn.microsoft.com) April 13, 2026
Microsoft 365 admins locked out of tenants after all Global Admins removed
BleepingComputer (bleepingcomputer.com) April 14, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Microsoft 365Entra IDAzure ADTenant LockoutCloud SecurityIncident ResponseGlobal Administrator

📢 Share This Article

Help others stay informed about cybersecurity threats