Threat actors more frequently — and successfully — target Active Directory
- Half of large companies have been the subject of a cyberattack on Active Directory (AD) services in the last one to two years, a report from Enterprise Management Associates on behalf of Attivo Networks and Tenable found. In 42% of those attempts, the attacks were successful, according to the survey of 250 IT professionals and executives from organizations with at least 1,000 employees.
- The majority (86%) of companies plan to either slightly or significantly increase spending to secure AD environments. They cited reasons for the spending increase, include the higher prevalence of Active Directory attacks, the increase in work from home, the expanded use of cloud IT and the increased prevalence of ransomware.
- “The issue with AD is that it is so extensive that most customers do not have the in-depth knowledge to identify and fix every exposed setting or parameter,” Carolyn Crandall, chief security advocate and CMO at Attivo Networks, said. “It’s not just a matter of patching or incorrect configurations since there are references on hardening and configuring AD.”
Attacks on Active Directory have been a serious problem over the past year. AD attacks played a considerable role in the SolarWinds campaign and, most recently, in attacks involving LockBit 2.0 ransomware.
During the SolarWinds campaign, the state-sponsored threat actor used what is known as the Golden Security Assertion Markup Language (SAML) to create fake user credentials, bypass two-factor authentication and move laterally within a corporate network. The attackers gained elevated access privileges and, once granted, they exfiltrated data from the organization’s computer network.
Attackers often use open source and freely available tools like Bloodhound and Mimikatz to attack AD. The tools help attackers find the shortest path through AD and steal passwords during attacks.
AD is leveraged by more than 90% of organizations as the backbone of their identity management system, Gartner researchers estimated in a September 2020 study. Most companies, however, have difficulty with several aspects of using AD, including privileged access, identity governance and strong user authentication.
“AD is not a vulnerable solution by itself and it can be tuned and protected, however, default AD configuration leaves it vulnerable to what would be considered by most security experts as a common attack,” said Mickey Bresman, co-founder and CEO of Semperis.
Companies can use several techniques to protect AD, including reduce the use of privileged accounts, use jump boxes and follow secure technical implementation guides, Crandall said.
Read the original article by David Jones on Cybersecurity Dive.
Free Active Directory Assessment
Get Visibility Into Privilege And Service Account Exposure
For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.
Try Our Endpoint Detection Net (EDN) for Free
FAST AND EASY
Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.
ADSecure 90-Day Free Trial
GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY
- Hide and deny access to AD objects
- Get alerted on unauthorized queries
- Attack details easily viewable in dashboard
- Your data remains on-premise