• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Pinter 3 review

March 30, 2023

Nine Ways Entrepreneurs Can Use Cloud Technology To Scale Their Businesses

March 30, 2023

Nokia G60 5G review

March 30, 2023
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    Samsung’s One UI 5 update is largely about personalization

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Tech News»Users warned over Azure Active Directory authentication flaw
Tech News

Users warned over Azure Active Directory authentication flaw

September 14, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Users warned over Azure Active Directory authentication flaw
Share
Facebook Twitter LinkedIn Pinterest Email

Researchers at Secureworks’ Counter Threat Unit (CTU) have warned of a new and potentially serious vulnerability affecting the pass-through authentication (PTA) hybrid identity authentication method used in Azure Active Directory (AD).

PTA is one of three authentication options used for hybrid identities in Azure AD, the others being password-hash synchronisation (PHS) and identity federation.

It is considered a good option for organisations that cannot or do not wish to synchronise password hashes to the cloud, or ironically those that need stronger authentication controls. When it comes to identity federation, which is usually implemented with the AD Federation Services (AD FS), PTA is often held to be more secure – AD FS was notably exploited in the SolarWinds attack.

PTA works by installing agents on on-premise servers, up to a maximum of 40 per tenant. When a user accesses a service using the Azure AD identity platform, such as Microsoft 365, and provides their credentials, Azure AD encrypts them and sends an authentication request to one of the agents, which decrypts these credentials, logs in with them, and returns the results to the user.

However, the CTU research team has now demonstrated a successful proof of concept (PoC) for an exploit that if left unchecked can be used by a threat actor to exploit the PTA’s core installation processes and steal the agent’s identity by exporting the certificate that it uses for certificate-based authentication (CBA).

With this certificate to hand, a threat actor can perform a number of malicious actions, as the CTU team explained in its disclosure notice.

See also  Lyft sued by drivers, passengers claiming company failing to protect users from assault – DailyTech

“The compromised certificate can be used with the attacker-controlled PTA agent to create an undetectable backdoor, allowing threat actors to log in using invalid passwords, gather credentials and perform remote denial of service attacks,” said the team. “Attackers can renew the certificate when it expires to maintain persistence in the network for years. A compromised certificate cannot be revoked by an organisation’s administrators.”

However, having shared the research with Microsoft some months ago, Microsoft has insisted PTA is working as intended and has given no indication of any plans to address the vulnerability.

The Microsoft Security Response Center said: “Our team completed the assessment for this issue and we understand that the attack surface for this requires compromising a high security asset by gaining administrative access in the first place.

“If the customer followed our hardening guidance but the attacker still has access to the server that runs the PTA agent then they already had access to the user credentials, hence we believe this vulnerability in itself does not pose an additional risk.

“As a mitigation mechanism, we do have the ability to block agents on the server side based on customer escalations and furthermore we are looking into ways to improve our audit logs as an improved detection mechanism.”

Nevertheless, the Secureworks CTU is recommending Azure AD users perform the following actions to protect their tenants:

  • Treat all on-premise hybrid identity components, including servers with PTA agents, as tier zero servers;
  • Consider adopting alternative hybrid authentication methods, such as PHS or identity federation;
  • Monitor for activity indicative of compromise, such as someone logging in with an incorrect password – this activity can be seen in the Azure AD portal, also via the beta version of the Microsoft Graph sign-ins report. If a potentially compromised PTA agent is seen, it can be invalidated by creating a support request in the Azure AD portal.
  • Introduce multi-factor authentication to prevent cyber criminals exploiting a PTA agent.
See also  A team of 'GoldenEye 007' fans are developing a full campaign mod modeled after 'The Spy Who Loved Me'

Source link

active Authentication Azure Directory flaw Users warned
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

3D printer maker Glowforge debuts AI image generator to help users create artwork – Startup

February 8, 2023

What is a Service Robot? The vision of an intelligent service application is possible.

November 7, 2022

Fortinet Discloses Authentication Bypass Vulnerability Under Attack

October 13, 2022

GoHenry, the fintech for under-18s, raises $55M after passing 2M users • Fintech

October 13, 2022
Add A Comment

Comments are closed.

Editors Picks

Google’s Pixel 6a display can run at 90Hz if you’re willing to mod it

August 12, 2022

Indicators that suggest Bitcoin price recovery

September 10, 2022

Investment clubs are cool again, and maybe community is, too – Fintech

August 27, 2022

Social investing app Shares raises $40m for European enlargement

July 25, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Pinter 3 review

Nine Ways Entrepreneurs Can Use Cloud Technology To Scale Their Businesses

Nokia G60 5G review

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2023 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.