Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:
IPv6:
UpOrDown
Ping
MTR
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc & Sum

Weak Passwords Fueled Kerberoasting Breach

Image © Arstechnica
New details surrounding Ascension's ransomware incident point to internal security gaps, including weak passwords—a factor that may have enabled attackers to move from a compromised contractor’s laptop to the organization’s Windows Active Directory. The disclosure suggests the breach was not solely a Microsoft problem, but also a wake-up call for enterprise password hygiene and privilege control.

New details surrounding Ascension’s ransomware incident emphasize internal security gaps, including a weak password, which may have helped attackers pivot from a compromised contractor’s device to the organization’s Windows Active Directory—the central control plane that governs user accounts and privileges.

In a letter to the FTC chairman, Senator Ron Wyden’s office outlined findings that the attack began in February 2024 when a contractor’s laptop was infected after clicking a malware link surfaced by Microsoft’s Bing search. From there, the intruders allegedly moved laterally to Ascension’s crown jewel: the Active Directory, a key gateway to the network’s most sensitive systems.

Experts note that the breach spotlighted Kerberos, the authentication framework used by Active Directory. While newer deployments can default to stronger methods, Windows can fall back to the weaker option if a device on the network issues a request, enabling mechanisms such as Kerberoasting to crack service tickets offline and reach privileged accounts.

There is consensus among researchers that a weak password likely played a major role. Kerberoasting hinges on cracking a user’s password hash, a task dramatically easier when passwords are short or poorly chosen. The combination of a compromised contractor device and a weak credential created the conditions for later steps in the intrusion.

Security experts argue that stronger password policies, least-privilege access, and network segmentation—central tenets of zero-trust architecture—could have limited the spread of the breach. Microsoft has announced steps to de-emphasize the weak RC4-based Kerberos token and to make stronger encryption the default in future Active Directory deployments, but legacy devices and configurations still present risk today.

The focus on Microsoft’s role in enabling the fallbacks should not eclipse Ascension’s own responsibilities, the researchers say. The breach disrupted patient care across 140 hospitals and exposed the data of 5.6 million patients, underscoring the real-world stakes of password hygiene and proper privilege management in healthcare networks.

 

Arstechnica

Notícias relacionadas

APIs Sob Ataque: Proteção da Confiança Digital
Serpro desenvolve IA nacional para frear LLMs estrangeiros
TIP Brasil e Unifique firmam parceria 5G regional
Anatel mapeará condições de Internet no ensino superior
Anatel pode executar garantias para migrar Oi
Desoneração de M2M/IoT não resolve tudo

O ISP.Tools sobrevive graças aos anúncios.

Considere desativar seu bloqueador de anúncios.
Prometemos não ser intrusivos.

Consentimento de cookies

Usamos cookies para melhorar sua experiência em nosso site.

Ao usar nosso site, você concorda com os cookies. Saiba mais sobre o site