Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Active Directory Lateral Movement Techniques that Bypasses Authentication and Exfiltrate Data

Posted on August 7, 2025August 7, 2025 By CWS

Subtle assault vectors unveiled that exploit hybrid Lively Listing and Microsoft Entra ID environments, demonstrating how attackers can obtain full tenant compromise by beforehand unknown lateral motion methods.

These strategies, introduced at Black Hat USA 2025, expose important vulnerabilities in Microsoft’s authentication infrastructure that enable unauthorized entry to Change On-line, SharePoint, and Entra ID with out conventional authentication boundaries.

Key Takeaways1. Inject keys into OnPremAuthenticationFlowPolicy to forge Kerberos tickets, bypassing MFA undetected.2. Change hybrid certs generate S2S tokens with International Admin entry with out audit logs.3. Microsoft blocked some abuse (Aug 2025), Change/SharePoint nonetheless weak.

Seamless SSO Key Manipulation 

In accordance with Dirk-Jan Mollema’s BlackHat presentation, attackers with on-premises Lively Listing management can manipulate Seamless Single Signal-On (SSO) configurations to forge Kerberos service tickets for any person within the tenant. 

By including backdoor keys to the OnPremAuthenticationFlowPolicy, risk actors can create persistent entry mechanisms that bypass multi-factor authentication necessities. 

The method entails injecting customized symmetric keys with identifiers like 13371337-ab99-4d21-9c03-ed4789511d01 into the coverage’s KeysInformation array, enabling RC4-encrypted Kerberos ticket technology for any area person.

Forging Kerberos tickets

Significantly regarding is the flexibility to provision these backdoor keys on .onmicrosoft.com domains, which paradoxically works regardless of the logical inconsistency. 

The assault leverages the trustedfordelegation declare in JWT tokens, permitting impersonation of any hybrid person account. Microsoft’s audit logs present no visibility into these modifications, making detection extraordinarily difficult for safety groups.

Change Hybrid Certificates 

Essentially the most devastating assault vector exploits Change hybrid deployments by certificate-based authentication abuse.

Attackers can extract Change hybrid certificates from on-premises servers utilizing instruments like ADSyncCertDump.exe and leverage them to request Service-to-Service (S2S) actor tokens from Microsoft’s Entry Management Service (ACS). 

These unsigned bearer tokens, containing the service principal identifier 00000002-0000-0ff1-ce00-000000000000, present unrestricted entry to Change On-line and SharePoint with out person context validation.

The S2S tokens exploit the trustedfordelegation property, enabling attackers to impersonate any person inside the tenant for 24-hour intervals. 

Critically, these tokens generate no audit logs throughout issuance or utilization, function with out Conditional Entry coverage enforcement, and stay non-revocable as soon as issued. 

The assault chain entails requesting actor tokens for graph.home windows.web endpoints, successfully granting International Administrator privileges throughout the complete Microsoft 365 atmosphere.

Mitigations

Microsoft has acknowledged these vulnerabilities and applied partial mitigations, together with blocking S2S token abuse for first-party service principal credentials as of August 2025. 

Nevertheless, Change and SharePoint impersonation capabilities stay useful, posing ongoing dangers to hybrid deployments. 

The corporate plans to implement necessary separation of Change on-premises and Change On-line service principals by October 2025.

Organizations ought to instantly audit their Change hybrid configurations utilizing detection queries like AuditLogs | the place InitiatedBy.person.displayName == “Workplace 365 Change On-line” to determine suspicious actions. 

Further protecting measures embrace enabling arduous matching in Entra ID Join to forestall cloud-only account takeovers and implementing the precept of least privilege for Listing Synchronization Accounts. 

Safety groups should additionally monitor for unauthorized modifications to authentication insurance policies and contemplate transitioning to devoted Change hybrid purposes to restrict assault floor publicity.

Equip your SOC with full entry to the most recent risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Active, Authentication, Bypasses, Data, Directory, Exfiltrate, Lateral, Movement, Techniques

Post navigation

Previous Post: Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment
Next Post: Air France, KLM Say Hackers Accessed Customer Data

Related Posts

Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials Cyber Security News
Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers Cyber Security News
Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Cyber Security News
Building a Cyber-Resilient Organization in 2025 Cyber Security News
Sophisticated Skitnet Malware Actively Adopted by Ransomware Gangs to Streamline Operations Cyber Security News
Microsoft Confirms Teams Outage for Users, Investigation Underway Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure Docker Containers
  • Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems
  • Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks
  • Guided Selling in 3D Product Configurators
  • WhatsApp Developers Under Attack From Weaponized npm Packages with Remote Kill Switch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure Docker Containers
  • Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems
  • Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks
  • Guided Selling in 3D Product Configurators
  • WhatsApp Developers Under Attack From Weaponized npm Packages with Remote Kill Switch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News