• Advertise
  • Support Center
No Result
View All Result
Friday, May 23, 2025
CUSTOMER LOGIN
INNOCENT MICHAEL
  • Home
  • Browse
    • Exclusive
      • Business Stories
      • Rising Stars
    • Cybersecurity
      • Browse Topics
      • Data Breaches
      • Threat Intelligence
      • Malware & Ransomware
      • Scammers
      • Privacy Tools
    • Entertainment News
      • Entertainment Global
      • Nigeria Entertainment News
        • Celebrity News
        • Viral Trends & Memes
        • Awards & Recognitions
        • Behind the Scenes
        • Fan Communities
        • Interviews & Exclusive Stories
        • Movies & TV Shows
        • Music & Albums
        • Upcoming Releases
    • Tech
      • Gadgets & Devices
      • Tech Business
      • Smart Home
      • Laptops & PCs
      • Reviews & Comparisons
      • Smartphones
      • Events & Launches
      • Artificial Intelligence
      • Wearables
      • Internet & Infrastructure
      • Science & Innovation
      • Social Media & Communication
      • Software & Apps
    • Watch
      • Latest
      • Trending Videos
    • Audio
    • Podcast
    • Company Bulletin
      • Bulletin
      • Company News & Announcements
      • Culture & Community
      • Innovation Highlights
      • Team Achievements
      • Upcoming Projects & Initiatives
  • Shop
  • World
  • Legal Hub
    • Privacy Policy
    • Return & Refund Policy
Live TV Indicator
WATCH LIVE TV
  • Login
  • Register
INNOCENT MICHAEL
  • Home
  • Browse
    • Exclusive
      • Business Stories
      • Rising Stars
    • Cybersecurity
      • Browse Topics
      • Data Breaches
      • Threat Intelligence
      • Malware & Ransomware
      • Scammers
      • Privacy Tools
    • Entertainment News
      • Entertainment Global
      • Nigeria Entertainment News
        • Celebrity News
        • Viral Trends & Memes
        • Awards & Recognitions
        • Behind the Scenes
        • Fan Communities
        • Interviews & Exclusive Stories
        • Movies & TV Shows
        • Music & Albums
        • Upcoming Releases
    • Tech
      • Gadgets & Devices
      • Tech Business
      • Smart Home
      • Laptops & PCs
      • Reviews & Comparisons
      • Smartphones
      • Events & Launches
      • Artificial Intelligence
      • Wearables
      • Internet & Infrastructure
      • Science & Innovation
      • Social Media & Communication
      • Software & Apps
    • Watch
      • Latest
      • Trending Videos
    • Audio
    • Podcast
    • Company Bulletin
      • Bulletin
      • Company News & Announcements
      • Culture & Community
      • Innovation Highlights
      • Team Achievements
      • Upcoming Projects & Initiatives
  • Shop
  • World
  • Legal Hub
    • Privacy Policy
    • Return & Refund Policy
  • Login
  • Register
No Result
View All Result
INNOCENT MICHAEL
Home News
Microsoft Issues New Guidance to Combat Increasing Kerberoasting Attacks

Microsoft Issues New Guidance to Combat Increasing Kerberoasting Attacks

December 13, 2024
in News
0
Share on FacebookShare On Whatsapp

Microsoft has introduced updated guidance aimed at helping organizations defend against the rising threat of Kerberoasting attacks—a growing security risk to Active Directory (AD) environments. This type of cyberattack exploits vulnerabilities in the Kerberos authentication protocol , allowing attackers to steal AD credentials and potentially gain extensive access to sensitive resources.

“As the landscape of cyberthreats continues to evolve, it’s crucial for security professionals to stay up-to-date with the latest attack vectors and preventive measures,” Microsoft emphasized in a recent blog post. “Kerberoasting is a well-known attack method targeting Active Directory (AD), and its effectiveness is escalating due to the use of GPU-accelerated password cracking techniques .”

What is Kerberoasting?

Kerberoasting attacks involve attackers requesting Kerberos service tickets , which are encrypted using an account’s password hash. By using various password-cracking methods to decipher this hash, attackers can steal passwords and gain unauthorized access to AD accounts.

In a typical Kerberoasting attack, a compromised AD user account is used to request service tickets for other accounts,” Microsoft explained. “The attacker then performs an offline brute-force attack to steal the service account’s password. With these credentials, they potentially gain elevated privileges within the AD environment.”

Microsoft highlighted that accounts secured with weak passwords and those utilizing weaker encryption algorithms, such as RC4 , are particularly susceptible. The company reassured organizations that they plan to phase out RC4 encryption.

RC4 will be deprecated, and we aim to disable it by default in an upcoming update for Windows 11 24H2 and Windows Server 2025 ,” Microsoft confirmed.

Key Steps for Mitigating Kerberoasting Risks

To reduce the risk of Kerberoasting attacks, Microsoft recommends that organizations implement the following best practices:

  1. Utilize Group Managed Service Accounts (gMSA) or Delegated Managed Service Accounts (dMSA) : These account types provide centralized credential management and enhanced security by using long, randomly generated passwords that are highly resistant to brute-force cracking.
  2. Enforce Strong Passwords for Service Accounts : Microsoft advises setting a minimum password length of 14 characters and encourages organizations to use randomly generated passwords for added protection.
  3. Configure Service Accounts to Use AES Encryption : Transition away from RC4 to the Advanced Encryption Standard (AES) for stronger encryption of Kerberos service tickets.
  4. Audit and Remove Unnecessary Service Principal Names (SPNs) : Regularly review accounts with SPNs to ensure only necessary accounts have SPNs associated with them, thereby reducing the potential attack surface.

Detecting Kerberoasting Attacks

In addition to preventative measures, Microsoft offers guidance for detecting potential Kerberoasting activity. Organizations should:

  • Monitor for unusual Kerberos encryption types.
  • Look for alerts from Microsoft Defender .
  • Check for repeated service ticket requests that may indicate an ongoing attack.

By adopting these strategies, organizations can considerably bolster their defenses against Kerberoasting attacks and safeguard their AD environments from unauthorized access.

Conclusion

As Kerberoasting techniques continue to advance, particularly with the use of GPU acceleration for password cracking, Microsoft’s new guidance comes at a critical time. Through strong password policies, updated encryption standards, and regular auditing, organizations can stay ahead of this threat, ensuring the safety and integrity of their Active Directory environments.

ShareSendTweetShareShare

Related Posts

6 Key Tips to Secure the Perfect Buyer for Your Business
Business

6 Key Tips to Secure the Perfect Buyer for Your Business

February 5, 2025
2
Pick the Best Crypto Processor for Your Business Success
Business

Pick the Best Crypto Processor for Your Business Success

February 3, 2025
7
Seven Planets Align in 2025: A Rare Celestial Spectacle Designed by Innocent Michael
Science

Seven Planets Align in 2025: A Rare Celestial Spectacle

January 23, 2025
16
Concerns Rise as 20,000 Indian Students Miss Designated Canadian Colleges Designed by Innocent Michael
News

Concerns Rise as 20,000 Indian Students Miss Designated Canadian Colleges

January 21, 2025
7
CRA Introduces New Sign-In Process for Tax Season 2025
Business

CRA Introduces New Sign-In Process for Tax Season 2025

January 17, 2025
12
Amazon Expands Ad Tools for Retailers to Boost In-Store Marketing
News

Amazon Expands Ad Tools for Retailers to Boost In-Store Marketing

January 12, 2025
7
Subscribe
Login
Notify of
guest
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
video
play-rounded-fill

Stay Updated

Subscribe to our newsletter and be the first to receive updates, tips, and exclusive offers straight to your inbox.

Haysuite Haysuite Haysuite
The UK’s phone theft crisis is a wake-up call for digital security
Hackers

The UK’s phone theft crisis is a wake-up call for digital security

April 19, 2025
25
7 Clever Ways to Reuse Your Old Windows 10 PC
Tech

7 Clever Ways to Reuse Your Old Windows 10 PC

April 19, 2025
8
8 Proven Ways to Clear Clipboard on Windows 11 Safely
Windows

8 Proven Ways to Clear Clipboard on Windows 11 Safely

April 18, 2025
11
What to Do When Ransomware Hits: Pay or Prepare?
Ransomware

What to Do When Ransomware Hits: Pay or Prepare?

April 18, 2025
10
Meta Resumes EU AI Training: Why Europe’s Data Matters
AI

Meta Resumes EU AI Training: Why Europe’s Data Matters

April 16, 2025
23

© 2024 Innocent Michael Network Inc..

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Login
  • Sign Up
  • Cart
Live TV Indicator
WATCH LIVE TV
  • Home
  • Browse
    • Exclusive
      • Business Stories
      • Rising Stars
    • Cybersecurity
      • Browse Topics
      • Data Breaches
      • Threat Intelligence
      • Malware & Ransomware
      • Scammers
      • Privacy Tools
    • Entertainment News
      • Entertainment Global
      • Nigeria Entertainment News
    • Tech
      • Gadgets & Devices
      • Tech Business
      • Smart Home
      • Laptops & PCs
      • Reviews & Comparisons
      • Smartphones
      • Events & Launches
      • Artificial Intelligence
      • Wearables
      • Internet & Infrastructure
      • Science & Innovation
      • Social Media & Communication
      • Software & Apps
    • Watch
      • Latest
      • Trending Videos
    • Audio
    • Podcast
    • Company Bulletin
      • Bulletin
      • Company News & Announcements
      • Culture & Community
      • Innovation Highlights
      • Team Achievements
      • Upcoming Projects & Initiatives
  • Shop
  • World
  • Legal Hub
    • Privacy Policy
    • Return & Refund Policy
CUSTOMER LOGIN

Copyright © 2024 INNOCENT MICHAEL NETWORK INC.

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply