Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Openai and human researchers condemn “reckless” safety culture at Elon Musk’s Xai

GM teams up with Redwood Materials to power data center with EV batteries

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Critical Golden DMSA Attacks in Windows Server 2025 allow cross-domain attacks and permanent access
Identity

Critical Golden DMSA Attacks in Windows Server 2025 allow cross-domain attacks and permanent access

userBy userJuly 16, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 16, 2025Ravi LakshmananWindows Server / Enterprise Security

Important DMSA defects in Windows Server 2025

Cybersecurity researchers have revealed what they say is a “significant design flaw” in the Delegated Managed Service Account (DMSA) introduced in Windows Server 2025.

“This flaw can cause impactful attacks, allowing cross-domain lateral movement, allowing permanent access to all managed service accounts and their resources indefinitely across Active Directory,” Semperis said in a report she shares with Hacker News.

Put another way, successful exploits allow the enemy to avoid authentication guardrails and generate passwords for all delegated managed service accounts (DMSAS) and group managed service accounts (GMSA) and associated service accounts.

The way tenacity and privilege escalation is known as Golden DMSA, and cybersecurity companies see it as low complexity due to the fact that vulnerabilities simplify brute force password generation.

However, for a bad actor to exploit it, he normally needs to already have a Key Distribution Service (KDS) root key that is available to privileged accounts such as root domain administrators, enterprise administrators, and systems.

Cybersecurity

The KDS root key, known as the Crown Jewel in Microsoft’s GMSA Infrastructure, acts as the master key, allowing an attacker to derive the current password for a DMSA or GMSA account without having to connect to a domain controller.

“The attacks take advantage of important design flaws. The structure used for password generation calculations includes predictable time-based components and only 1,024 combinations, so brute-force password generation is computationally trivial.

Delegated managed service accounts are a new feature introduced by Microsoft that facilitates migration from existing legacy service accounts. It was introduced in Windows Server 2025 as a way to counter Kerberoasting attacks.

The machine binds the authentication directly to be directly bound to an explicitly certified machine in Active Directory (AD) to eliminate the possibility of credential theft. By linking authentication to the device’s ID, only the identity of the specified machine mapped to AD can access the account.

Similar to Golden GMSA Active Directory attacks, Golden DMSA plays over four steps once an attacker acquires high privileges in the domain –

By increasing system privileges on one of the domain controllers enumerating DMSA accounts using the LSAOPENPOLICHY and LSALOOKUPSIDS APIs, you can extract KDS root key material or identify passwords via managed password attributes via managed word attributes (LDAP)-based approaches, which can be associated with compromised keys via managed password attributes (LDAP)-based approaches, pass hash and test or cover the hash technique

“This process is a particularly dangerous way of persistence as it does not require additional privileged access once the KDS root key is obtained,” Malyanker said.

“The attacks highlight the critical trust boundaries of managed service accounts. They rely on domain-level encryption keys for security. Automatic password rotation provides excellent protection for typical entitlement attacks, domain administrators, DNSADMINs, and print operators, but can bypass these protections completely and complicate all DMS and GMSAs in the forest.

Semperis pointed out that by compromising the KDS root key from a single domain within a forest, it would transform the violation into a permanent backdoor of the entire forest, given that it is sufficient to infringe all DMSA accounts across all domains of that forest.

Cybersecurity

In other words, a single KDS root key extraction can be weaponized to achieve domain-wide cross-domain account compromise, forest-wide qualification harvesting, and lateral movement using compromised DMSA accounts.

“Even in environments with multiple KDS root keys, the system consistently uses the first (oldest) KDS root key for compatibility reasons,” Malyanker noted. “This means that the original keys we compromised could be saved by Microsoft’s design.

What’s even more concerning is that the attack completely avoids the normal credential guard protection used to protect the hash of NTLM passwords.

Following the responsible disclosure on May 27, 2025, Microsoft said, “If there is a secret to derive a key, you can authenticate as a user. These features were never intended to protect against the compromise of a domain controller.” Semperis also released open source as a proof of concept (POC) to demonstrate the attack.

“What begins a single DC compromise will escalate to owning all DMSA protected services across Enterprise Forest,” Malyanker said. “It’s not just a privilege escalation, it’s digital domination across the enterprise through a single cryptographic vulnerability.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMeet Skydweller: Solar-powered drone that can fly straight for 90 days – Wide and 160 times lighter than the Boeing 747
Next Article USDOT launches a rich “safe road” program
user
  • Website

Related Posts

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

July 16, 2025

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

July 16, 2025

Fully patched Sonic Wall SMA 100 Series Device with UNC6148 Backdoor of Step Rootkit

July 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Openai and human researchers condemn “reckless” safety culture at Elon Musk’s Xai

GM teams up with Redwood Materials to power data center with EV batteries

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

GMC Hummer Ev surpassed Tesla Cybertruck’s last quarter

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.