Today was supposed to be an exciting Friday morning at a Multi-Billion $ organization since the world’s top Cloud Computing companies were going to make their final pitches to the company’s C-Suite today, as it was considering moving to the “Cloud.”
With Cloud Computing companies spending billions to market their latest Kool-Aid to organizations worldwide (even though much of this may actually not be ready for mission-critical stuff), how could this company too NOT be considering the Cloud?
The C-Suite Meeting
Today was a HUGE day for this multi-billion dollar company, for today after several months of researching and evaluating their choices and options, the company’s leadership would finally be deciding as to which Cloud Computing provider to go with.
This meeting is being chaired by the Chairman of the Board and attended by the following organizational employees –
After breakfast, the presentations began at 9:00 am. The organization’s CIO kicked off the meeting, rattling off the numerous benefits that the company could enjoy by moving to the Cloud, and minutes later the Vice President of Cloud Computing from the first Cloud Computing company vying for their business started his presentation. His presentation lasted two hours.
The C-Suite then took a break for lunch.
The next presentation began at 1:00 pm and was expected to last till about 4:00 pm. The Vice President of Cloud Computing from the second Cloud Computing company had started her presentation and was almost an hour into it, when all of a sudden this happened…
Everyone was surprised, and all eyes were on the CISO, who grimly asked his assistant – “Are you 100% sure?” He said “Yes.”
Houston, We Have a Problem
The CISO walked up to the CIO and whispered something into his ear. The CIO sat there in complete shock for a moment!
He then gathered himself and proceeded to request everyone except the C-Suite to immediately leave the conference room.
He told the Vice President of this Cloud Computing company – “Hopefully, we’ll get back to you in a few weeks.“
He then looked at the CEO and the Chairman of the Board, and he said – “Sir, we have a problem!“
The CEO asked the CIO – “What’s wrong? What happened?”
The CIO replied – “Sir, about 30 minutes ago, an intruder compromised the credentials of each one of our 20,000 employees!“
The CEO was almost in shock, and just couldn’t believe what he had just heard, so he asked – “Everyone‘s credentials?!”
The CIO replied – “I’m afraid yes Sir, yours, mine, literally everyone’s, including that of all our privileged users!“
The CEO could sense that there was more bad news, so he asked – “Is there something else I should know?“
The CIO replied – “Sir, 15 minutes ago, the intruder logged on as an Enterprise Admin, disabled the accounts of each one of our privileged users, and used Group Policy to deploy malicious software to each one of our 30,000 domain-joined computers! By now, he could have stolen, exfiltrated and destroyed the entirety of our digital assets! We may have lost literally everything!”
The CEO was shocked! They’d just been breached, and what a massive breach it was – “How could this have happened?”
The CIO turned to the CISO, who stepped in, and answered the question – “Sir, an intruder used a tool called Mimikatz DCSync to basically request and instantly obtain the credentials of every single user from our foundational Active Directory deployment.“
The CEO then said – “This does not sound right to me. I’m no technical genius, but shouldn’t we have known exactly who all have this, whatever you just said, er yes that Get-Replication-Changes-All effective permissions in our Active Directory?!“
The CISO replied – “Sir, it turns out that accurate determination of effective permissions in Active Directory is actually very difficult, and as a result it is almost impossible to figure out exactly who has this effective permissions on our domain root!”
The CEO figured it out – “So you’re saying that the intruder had compromised the account of someone who was not on your radar and not supposed to have this access, but actually did, and the intruder used that access to steal everyone’s credentials?“
The CISO replied – “That’s right. It appears we did not know that this someone had sufficient access (i.e. effective permissions) to be able to replicate secrets from Active Directory, because it is very difficult to accurately figure this out in Active Directory.“
The CEO was furious! – “You’re kidding right?! Microsoft’s spent billions on this new fad called the “Cloud”, yet it doesn’t even have a solution to help figure out something as vital as this in Active Directory? How long has Active Directory been around ?!
The CISO replied – “Seventeen years.“
The CEO then said in disbelief – “Did you just 17 years, as in S-E-V-E-N-T-E-E-N years?! Get Satya Nadella on the line now! Perhaps I should #REFRESH his memory that we’re a customer, and that we may have just lost a few B-I-L-L-I-O-N dollars!“
The moral of the story is that while its fine to fall for the latest fad, i.e. consider moving to the “Cloud” and all, but as AND while you consider and plan to do so, you just cannot let you on-prem cyber defenses down even for a moment, because if you do so, you may not have a company left to move to the Cloud. A single excessive effective permission in Active Directory is all it takes.
I’ll say this one more time and one last time – what I’ve shared above could easily happen at almost any organization today.
PS2: Note for Microsoft – This may be the simplest example of “Active Directory Access Control Lists – Attack and Defense.”
Here’s why – Mimikatz DCSync, which embodies the technical brilliance of a certain Mr. Benjamin Delpy, may be the simplest example of how someone could attack Active Directory ACLs to instantly and completely compromise Active Directory. On the other hand, Gold Finger, which embodies the technical expertise of a certain former Microsoft employee, may be the simplest example of how one could defend Active Directory ACLs by being able to instantly identify/audit effective permissions/access in/across Active Directory, and thus lockdown any and all unauthorized access in Active Directory ACLs, making it impossible for an(y) unauthorized user to use Mimikatz DCSync against Active Directory.
PS4: If you liked this, you may also like – How To Easily Identify & Thwart Sneaky Persistence in Active Directory