April 30, 2024, 1:16 a.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Recently, there's been some good research into further exploiting DCOM authentication that I initially reported to Microsoft almost 10 years ago. By inducing authentication through DCOM it can be relayed to a network service, such as Active Directory Certificate Services (ADCS) to elevated privileges and in some cases get domain administrator access.

The important difference with this new research is taking the abuse of DCOM authentication from local access (in the case of the many Potatoes) to fully remote …

access active directory adcs administrator a network authentication can cases certificate certificate services dcom directory domain exploiting good important kerberos malware analysis microsoft network privileges relaying research service services

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Associate Product Security Engineer

@ Humana | USA - Berkeley, MO

Cyberspace Capability Developer

@ SNC-Lavalin | MA105: BBN Headquarters 10 Moulton Street , Cambridge, MA, 02138 USA