Buy

Impact of Privileged User Compromise

The compromise of a single Active Directory privileged user account or group could instantly result in a massive breach.

It is a well-known and witnessed fact that the compromise of a single Active Directory unrestricted privileged user account could instantly jeopardize the security of all organizational IT assets and result in a massive cyber security breach.

However, the impact of compromise of an Active Directory user that possesses restricted privileged access is not as well-known and well-understood yet, and consequently many such privileged accounts remain undetected and vulnerable.

System-wide Compromise

Impact of Compromise of a Privileged User who has Unrestricted Access in Active Directory

If someone could compromise an account that has unrestricted privileged access in Active Directory, he/she could instantly obtain command and control over the organization's entire IT infrastructure, systems, resources and data.

This would be tantamount to a system-wide breach, and potentially put the entire organization at risk of compromise.

Privileged User Compromise

Impact of Compromise of a User who can Manage Privileged User Accounts and Groups

If someone could compromise the account of a user that has sufficient effective permissions so as to be able to manage an organization's unrestricted privileged user accounts and groups in Active Directory, he/she too could instantly obtain command and control over the organization's entire IT infrastructure, systems, resources and data.

This too would be tantamount to a system-wide breach, and potentially put the entire organization at risk of compromise.

An Ocean of Privileged Access

An Ocean of Delegated Privileged Access

A widely-held popular belief is that the extent of privileged users in Active Directory are only those domain user accounts that are members of default privileged groups like Domain Admins etc.

However, at most organizations, today there exists an ocean of privileged access within their Active Directory that has been delegated and that is likely not yet on their radar.

As a result, at most organizations, there remain a large number of privileged user accounts in Active Directory that have not yet been identified and designated as privileged.

Consequently, all such accounts remain outside the umbrella of enhanced Privileged Access Management protection, and thus remain inadequately protected and vulnerable.

Organizations worldwide are advised and encouraged to gain a deeper understanding of privileged access in Active Directory as well as the impact of compromise of all privileged accounts.

Delegated Administrator Account Compromise

Top-10 Privilege Delegations + Impact of Compromise

The following are the Top-10 administrative delegations frequently made in most Active Directory deployments today -

  1. Modify the permissions on the AdminSDHolder object

  2. Reset privileged or other domain user account's password

  3. Change privileged or other domain group's membership

  4. Modify permissions protecting an Organizational Unit (OU)

  5. Link a Group Policy Object (GPO) to an OU

  6. Disable Smartcard is required for interactive logon option

  7. Create a domain user account

  8. Delete a domain security group

  9. Modify userAccountControl attribute on computer accounts

  10. Modify keywords attribute on Service Connection Points


The impact of compromise of domain user accounts that possess such delegated privileged access is presented below.

AdminSDHolder Compromise

Impact of Compromise of a Privileged User that Could Modify Permissions on AdminSDHolder

If a perpetrator could compromise an account that has sufficient effective permissions to modify permissions on, or the ownership of the AdminSDHolder object, he/she could gain control over all default privileged accounts and groups in Active Directory.

This too would be tantamount to a system-wide breach, and potentially put the entire organization at risk of compromise.


For example, if someone were to add a single security permission to the ACL of the AdminSDHolder object, such as Allow   Authenticated Users   Full Control, literally every single domain user account and domain-joined computer would instantly become a Domain Admin equivalent privileged user.

Security risk of an unauthorized password reset in Active Directory

Impact of Compromise of a Privileged User that Could Reset a Domain User Account's Password

If someone could compromise an account that has sufficient effective permissions to reset the password of a domain user account, he/she could instantly login as that account and access all IT resources that account has access to.

It someone could reset the password of even a single Active Directory privileged user's account, that too would be tantamount to a system-wide breach, and potentially put the entire organization at risk of compromise.


For example, if someone were to reset the password of an organization's CEO, CFO, CIO, CISO or the account of any Active Directory privileged user, he/she could instantly login as that individual and do whatever he/she desires.

Security risk of an unauthorized group membership change in Active Directory

Impact of Compromise of a Privileged User that Could Change an AD Group's Membership

If someone could compromise an account that has sufficient effective permissions to change a domain security group's membership, he/she could add his/her/any account to that group and obtain access to all IT resources to which that group has access.


For example, if someone could change the membership of a group called Confidential/Restricted Level-3 Access, he/she could instantly obtain access to all (potentially thousands of) IT resources (files, folders, databases, Intranet sites, applications, etc.) in the network to which that group is granted access.

Security risk of an unauthorized delegated permissions change in Active Directory

Impact of Compromise of a Privileged User that Could Modify Permissions Protecting an OU

If someone could compromise an account that has sufficient effective permissions to modify the permissions protecting an OU, he/she could use inheritance of permissions to gain privileged access on all domain accounts, computers, groups etc. in that OU.


For example, if someone could modify the security permissions protecting a top-level OU called Corp, he/she could instantly gain full administrative control over all (potentially thousands of) domain user accounts, computer accounts, security groups, printers, service connection points etc. that reside in that OU, and subsequently use that gained access to easily further gain unrestricted access to thousands of IT resources in the network.

Security risk of an unauthorized linking a GPO

Impact of Compromise of a Privileged User that Could Link a Group Policy to an OU

If someone could compromise an account that has sufficient effective permissions to link a GPO to an OU, he/she could link a malicious GPO to compromise, or gain privileged access on, all computers whose domain computer accounts reside in that OU.


For example, if someone could link a single malicious GPO to an OU in which a large number of the organization's computer accounts reside, such as an OU named Computers, he/she could instantly gain privileged access over all those computers, as well as subsequently use that gained access to easily further gain unrestricted access to all IT resources on those computers.

Security risk of unauthorized disabling of Smartcard required for authentication option

Impact of Compromise of a Privileged User that Could Disable the Use of SmartCards

If someone could compromise an account that has sufficient effective permissions to disable the use of Smartcards on domain user accounts, he/she could downgrade account security to solely being password based, thus disabling two-factor authentication and significantly weakening security, then reset their password to instantly login to these accounts.


For example, if someone could disable the use of Smartcards on a single privileged or executive user's account, he/she could then downgrade security on that account to being password based, and use this to more easily attempt to compromise that account by attempting various credential theft-attack vectors, such as Password guessing, brute-forcing, Pass-the-Hash (PtH) etc. If he/she could also reset the account's password, then he/she could take over that account within a matter of seconds without having to do anything else.

Security risk of an unauthorized account creation in Active Directory

Impact of Compromise of a Privileged User that Could Create Domain User Accounts

If someone could compromise an account that has sufficient effective permissions to create domain user accounts in Active Directory, he/she could create an alternate account to engage in malicious activity that could likely not be traced back to the perpetrator.


For example, if an intruder or a malicious insider could create a domain user account, he/she would create an Active Directory account that would seem like a legitimate user account, and then (mis-)use it to easily engage in any desired nefarious activities, as well as automatically obtain access to all IT resources to which Authenticated Users have access.

Security risk of an unauthorized group deletion in Active Directory

Impact of Compromise of a Privileged User that Could Delete a Domain Security Group

If someone could compromise an account that has sufficient effective permissions to delete an existing domain security group, he/she could cause all members of that group to no longer have access to all IT resources to which that group is granted access.


For example, if someone could delete a domain security group such as All Employees, he/she would cause all members of that group to no longer be able to access any (and possibly thousands of) IT resources to which that group has access.

Security risk of an unauthorized modification of userAccountControl attribute on domain computer accounts

Impact of Compromise of a Privileged User that Could Modify userAccountControl Attribute on Computer Accounts

If someone could compromise an account that has sufficient effective permissions to modify the userAccountControl attribute on a computer account, he/she could set the Trusted for Unconstrained Delegation bit on that domain computer account, which could then enable this individual to use Kerberos delegation to impersonate a user and elevate privilege.


For example, if an intruder or a malicious insider could set this bit on the domain computer account of a computer that he/she has control over, then if he/she could lure a privileged user to access a service running on that computer, he/she could impersonate that privileged user to elevate privilege and gain domain-wide privileged access, potentially resulting in a massive breach.

Security risk of an unauthorized modification of Service Connection Point keywords

Impact of Compromise of a Privileged User that Could Modify Keywords Attribute on SCPs

If someone could compromise an account that has sufficient effective permissions to modify the keywords attribute on a service connection point (SCP), he/she could launch a denial-of-service attack on the service that relies on that SCP.


For example, if an intruder or a malicious insider could change the keywords of the service connection point used to join the Active Directory to Microsoft Azure, then he/she could instantly cause an organization-wide denial of service attack wherein access to Microsoft Azure would be disrupted for all organizational users.

Consider This

The Importance of Correctly Identifying Privileged Access in Active Directory

As illustrated above, the compromise of a single user account that even has restricted privileged access in Active Directory could equally result in a cyber security breach.

Unlike members of default Active Directory privileged groups which are easy to identify, it is not easy to identify accounts that possess delegated privileged access in Active Directory.

To correctly identify accounts that possess delegated privileged access in Active Directory, organizations need to accurately identify effective permissions on Active Directory objects.

Organizations worldwide are thus advised and encouraged to gain a deeper understanding of both unrestricted and delegated privileged access, and effective permissions in Active Directory.


Our Global Customers

  • Australian Government
  • United States Treasury
  • British Government
  • Government of Canada
  • British Petroleum
  • Ernst and Young
  • Saudi Arabian Monetary Agency
  • Juniper Networks
  • U.S. Department of Defense
  • Microsoft Corporation
  • United Nations
  • Quantium
  • Nestle
  • IBM Corporation
  • U.S. Federal Aviation Administration
  • Columbia University

Your Privacy

We use cookies to provide you the best online experience. Please let us know if you accept these cookies.