Attacks/Breaches
6/16/2017
07:40 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Hacker Bypasses Microsoft ATA for Admin Access

Microsoft's Advanced Threat Analytics defense platform can be cheated, a researcher will show at Black Hat USA next month.

Microsoft's Advanced Threat Analytics (ATA) platform for detecting cyberattacks can be evaded by attackers to achieve organizational control, a security researcher has discovered.

ATA works by reading information from multiple sources: Windows Event Logs, SIEM events, and certain protocols to the Domain Controller. When communication to the Domain Control is done using protocols like Kerberos, NTLM, RPC, DNS, LDAP, etc., ATA parses the traffic to gather data about possible attacks and user behavior. ATA can detect known attacks like pass-the-hash, pass-the-ticket, Directory Services replication, brute-force, and skeleton key, for example.

But Nikhil Mattal, hacker for the Pentester Academy, found a way to bypass ATA and gain administrative access, which he will detail next month at Black Hat USA in Las Vegas in his session there, "Evading Microsoft ATA for Active Directory Domination." 

"In the past couple of years, there have been increasing attacks on how Windows domain works," Mattal says. For example, if someone logs on to a desktop and their credentials are compromised, ATA will sense whether the user is logged on to multiple machines and send an alert.

It's also used to detect lateral movement across machines and throughout the corporate environment. ATA can be used to authenticate to different resources, driving the consequences of what could happen if the system were compromised.

Mattal calls ATA "the new sheriff in town" for enterprise security and many businesses still don't use it, but adds it's among the most effective mechanisms for businesses today. This initial explanation of ATA will serve as a foundation for the crux of his talk, which will focus on how hackers can bypass ATA and achieve organizational dominance.

There are ways for cybercriminals to evade the detection capabilities of ATA, or avoid the system entirely, to launch dangerous attacks. If they can bypass ATA, it's possible for them to gain domain administrative privileges and access each and every resource in the enterprise.

Attackers can slightly alter the so-called golden ticket attack, for example, to evade the detection capabilities of ATA and gain administrative privileges. ATA is designed to detect users trying to create a "golden ticket" to gain this level of access. However, attackers can bypass this by changing a packet in the Kerberos protocol used to connect with the Domain Controller.

"ATA detects anomalies but by changing the structure of the golden ticket, it is possible to completely bypass it," Mattal explains, noting that attackers can use this to access data.

"Consumer records, intellectual property … attackers can persist in that environment using the golden ticket and there would be no detection at all," he continues.

Mattal at Black Hat will dive into the technicalities of the golden ticket as well as other types of possible attacks against ATA and present live demonstrations of how they work. He says he has communicated his findings to Microsoft and is collaborating with its team to address the issues. Microsoft is working to push an update before Black Hat, and Mattal plans to adjust his presentation based on the progress there, he notes.

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada, July 22-27, 2017. Click for information on the conference schedule and to register.

 

Related Content:

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance & Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
KpmL136
50%
50%
KpmL136,
User Rank: Apprentice
8/16/2017 | 1:53:45 AM
Upcoming Events of Cyber Security:
ISC2 CISSP Training Kuwait

SC² CISSP CERTIFICATION TRAINING DOHA

ISC² CISSP CERTIFICATION TRAINING RIYADH

ISC² CISSP Training Egypt
theb0x
100%
0%
theb0x,
User Rank: Ninja
6/19/2017 | 9:51:04 AM
ATA Admin Access
Most likely exploits a covert channel.
KpmL136
100%
0%
KpmL136,
User Rank: Apprentice
6/19/2017 | 9:10:45 AM
MICROSOFT MVP: Andy Malone | Cyber Security
Cyber security is an important concern of this era and needs to be tackled properly. There are many professionals working towards protecting the organization from hacking but the end result is known to all. May companies have recently become the victim of cyber attack. Keeping this in concern the Microsoft MVP Andy Malone is going to conduct CISSP 5 days boot camp with kpm learning solutions to help experienced professional complete CISSP certification and also the training will add value to CV which in future will help for a better career by making them capable of handling security threats.
3 Ways to Retain Security Operations Staff
Oliver Rochford, Vice President of Security Evangelism at DFLabs,  11/20/2017
A Call for Greater Regulation of Digital Currencies
Kelly Sheridan, Associate Editor, Dark Reading,  11/21/2017
New OWASP Top 10 List Includes Three New Web Vulns
Jai Vijayan, Freelance writer,  11/21/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.