Article 5Q313 New Azure Active Directory password brute-forcing flaw has no fix

New Azure Active Directory password brute-forcing flaw has no fix

by
Ax Sharma
from Ars Technica - All content on (#5Q313)
michael-dziedzic-VlZYu3nZIRI-unsplash-80

Enlarge (credit: Michael Dziedzic)

Imagine having unlimited attempts to guess someone's username and password without getting caught. That would make an ideal scenario for a stealthy threat actor-leaving server admins with little to no visibility into the attacker's actions, let alone the possibility of blocking them.

A newly discovered bug in Microsoft Azure's Active Directory (AD) implementation allows just that: single-factor brute-forcing of a user's AD credentials. And, these attempts aren't logged on to the server.

Invalid password, try again, and again...

In June this year, researchers at Secureworks Counter Threat Unit (CTU) discovered a flaw in the protocol used by Azure Active Directory Seamless Single Sign-On service.

Read 20 remaining paragraphs | Comments

index?i=SpPlksObkqE:DAilhr42eWU:V_sGLiPB index?i=SpPlksObkqE:DAilhr42eWU:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments