Microsoft Active Directory Attacks
Microsoft Active Directory Attacks
Directory attacks
Clement Olaosebikan
Initial Findings
Microsoft stated that attackers could penetrate a Domain Admin user in an Active
enable remote hackers to elevate their privilege to that of a Domain Admin once they
“As Defender for Identity’s mission is to secure Active Directory and your environment
against advanced and sophisticated identity threat attacks, our research team reacted
fast and published a query that can be used to identify suspicious behavior leveraging
these vulnerabilities.
Attackers Exploiting replication privileges to access
sensitive domain data
hashes.
To identify whether your systems are affected due to these vulnerabilities, Microsoft recommended the following:
● The sAMAccountName change is based on event 4662. Make sure to enable it on the domain controller to
● Copy the following query (which is also available in the Microsoft 365 Defender GitHub Advanced Hunting
query).
● Replace the marked area with the naming convention of your domain controllers.
● Run the query and analyze the results which contain the affected devices. You could use
Windows Event 4741 to find the creator of these machines if they were newly created.
● We recommend investigating these compromised computers and determining that they haven’t been
weaponized.
THANK YOU
Clement Olaosebikan