Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Active Directory Lateral Movement Techniques that Bypasses Authentication and Exfiltrate Data

Posted on August 7, 2025August 7, 2025 By CWS

Subtle assault vectors unveiled that exploit hybrid Lively Listing and Microsoft Entra ID environments, demonstrating how attackers can obtain full tenant compromise by beforehand unknown lateral motion methods.

These strategies, introduced at Black Hat USA 2025, expose important vulnerabilities in Microsoft’s authentication infrastructure that enable unauthorized entry to Change On-line, SharePoint, and Entra ID with out conventional authentication boundaries.

Key Takeaways1. Inject keys into OnPremAuthenticationFlowPolicy to forge Kerberos tickets, bypassing MFA undetected.2. Change hybrid certs generate S2S tokens with International Admin entry with out audit logs.3. Microsoft blocked some abuse (Aug 2025), Change/SharePoint nonetheless weak.

Seamless SSO Key Manipulation 

In accordance with Dirk-Jan Mollema’s BlackHat presentation, attackers with on-premises Lively Listing management can manipulate Seamless Single Signal-On (SSO) configurations to forge Kerberos service tickets for any person within the tenant. 

By including backdoor keys to the OnPremAuthenticationFlowPolicy, risk actors can create persistent entry mechanisms that bypass multi-factor authentication necessities. 

The method entails injecting customized symmetric keys with identifiers like 13371337-ab99-4d21-9c03-ed4789511d01 into the coverage’s KeysInformation array, enabling RC4-encrypted Kerberos ticket technology for any area person.

Forging Kerberos tickets

Significantly regarding is the flexibility to provision these backdoor keys on .onmicrosoft.com domains, which paradoxically works regardless of the logical inconsistency. 

The assault leverages the trustedfordelegation declare in JWT tokens, permitting impersonation of any hybrid person account. Microsoft’s audit logs present no visibility into these modifications, making detection extraordinarily difficult for safety groups.

Change Hybrid Certificates 

Essentially the most devastating assault vector exploits Change hybrid deployments by certificate-based authentication abuse.

Attackers can extract Change hybrid certificates from on-premises servers utilizing instruments like ADSyncCertDump.exe and leverage them to request Service-to-Service (S2S) actor tokens from Microsoft’s Entry Management Service (ACS). 

These unsigned bearer tokens, containing the service principal identifier 00000002-0000-0ff1-ce00-000000000000, present unrestricted entry to Change On-line and SharePoint with out person context validation.

The S2S tokens exploit the trustedfordelegation property, enabling attackers to impersonate any person inside the tenant for 24-hour intervals. 

Critically, these tokens generate no audit logs throughout issuance or utilization, function with out Conditional Entry coverage enforcement, and stay non-revocable as soon as issued. 

The assault chain entails requesting actor tokens for graph.home windows.web endpoints, successfully granting International Administrator privileges throughout the complete Microsoft 365 atmosphere.

Mitigations

Microsoft has acknowledged these vulnerabilities and applied partial mitigations, together with blocking S2S token abuse for first-party service principal credentials as of August 2025. 

Nevertheless, Change and SharePoint impersonation capabilities stay useful, posing ongoing dangers to hybrid deployments. 

The corporate plans to implement necessary separation of Change on-premises and Change On-line service principals by October 2025.

Organizations ought to instantly audit their Change hybrid configurations utilizing detection queries like AuditLogs | the place InitiatedBy.person.displayName == “Workplace 365 Change On-line” to determine suspicious actions. 

Further protecting measures embrace enabling arduous matching in Entra ID Join to forestall cloud-only account takeovers and implementing the precept of least privilege for Listing Synchronization Accounts. 

Safety groups should additionally monitor for unauthorized modifications to authentication insurance policies and contemplate transitioning to devoted Change hybrid purposes to restrict assault floor publicity.

Equip your SOC with full entry to the most recent risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Active, Authentication, Bypasses, Data, Directory, Exfiltrate, Lateral, Movement, Techniques

Post navigation

Previous Post: Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment
Next Post: Air France, KLM Say Hackers Accessed Customer Data

Related Posts

Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites Cyber Security News
Scavenger Malware Hijacks Popular npm Packages to Attack Developers Cyber Security News
5 Email Attacks SOCs Cannot Detect Without A Sandbox  Cyber Security News
Windows DWM 0-Day Vulnerability Allows Attackers to Escalate Privileges Cyber Security News
Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations Cyber Security News
The Rise of Subscription-Based Cybercrime Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure Docker Containers
  • Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks
  • Guided Selling in 3D Product Configurators
  • SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
  • SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure Docker Containers
  • Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks
  • Guided Selling in 3D Product Configurators
  • SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
  • SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News