SpecterOps adds new Attack Paths to BloodHound Enterprise

SpecterOps announced updates to BloodHound Enterprise that add new Attack Paths focused on Active Directory Certificate Services.
These updates make BHE the most advanced tool on the market today for securing ADCS. ADCS is the Public Key Infrastructure implementation of Microsoft Active Directory and is widely used in enterprise environments including most of the Fortune 1000.
If attackers can abuse it to give themselves false authentication certificates, they can gain account and domain-level privileges and establish deep persistence.
Misconfigurations in ADCS are common and pose an enormous security risk, but have traditionally been overlooked by the security community with few tools available to help secure it.
These new ADCS attack paths are based on work by SpecterOps researchers Will Schroeder and Lee Chagolla-Christensen, first released in 2021.
They discovered many common misconfigurations in enterprise ADCS environments that allow attackers to steal certificates, achieve account persistence, and achieve full control over an Active Directory domain.
These updates allow BHE users to easily identify and remediate these misconfigurations and significantly reduce their risk.
ADCS provides the mechanism used for encrypting file systems, digital signatures, user authentication and more.
The nature of ADCS makes it very difficult for defenders to detect or respond to attacks on it after they've been executed.
Removing misconfigurations and weaknesses in ADCS is the best way to reduce the risk of these serious attacks.
In response, SpecterOps is adding multiple attack paths related to ADCS to BloodHound Enterprise.
Three of them are available in the product now in Early Access with three to follow later in January.
BHE customers can enable these paths through their Early Access page.
Additional paths will be added throughout early 2024 as additional research is completed.
BloodHound Enterprise is the industry's first platform for comprehensively removing identity attack paths in Microsoft's Active Directory and Entra/Azure AD. It experienced rapid customer adoption in 2022 and 2023 with significant product revenue growth and new customer acquisition growing by more than 600%. Today, BloodHound Enterprise is used worldwide by companies like Capital Group, the University of Texas at Austin and Woodside Energy.
SpecterOps raised a $33.5 million Series A funding round from Decibel and Ballistic Ventures in 2023.
This update is one of many projects that funding has enabled or accelerated.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Tue, 09 Jan 2024 17:13:06 +0000


Cyber News related to SpecterOps adds new Attack Paths to BloodHound Enterprise

SpecterOps adds new Attack Paths to BloodHound Enterprise - SpecterOps announced updates to BloodHound Enterprise that add new Attack Paths focused on Active Directory Certificate Services. These updates make BHE the most advanced tool on the market today for securing ADCS. ADCS is the Public Key ...
5 months ago Helpnetsecurity.com
Microsoft Breach - How Can I See This In BloodHound? - On January 25, 2024, Microsoft announced Russia's foreign intelligence service breached their corporate EntraID environment. We reviewed the information Microsoft's team provided in their post which contained details significant enough to explain ...
5 months ago Securityboulevard.com
CISA adds Check Point Quantum Security Gateways and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog - CISA adds Apache Flink flaw to its Known Exploited Vulnerabilities catalog. CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities catalog. CISA adds Google Chrome zero-days to its Known Exploited Vulnerabilities catalog. CISA adds ...
1 month ago Securityaffairs.com
Cypher Queries in BloodHound Enterprise - Our first use case is identifying Domain Trusts that exist within an environment. Our specific query here, Map Domain Trusts can be selected which automatically populates the search window with the built-in query. Selecting Search will then return a ...
5 months ago Securityboulevard.com
CVE-2020-8023 - A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise Storage 5, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Point of ...
3 years ago
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
1 year ago Trendmicro.com
New infosec products of the week: January 12, 2024 - Here's a look at the most interesting products from the past week, featuring releases from Critical Start, Dasera, ID R&D, and SpecterOps. SpecterOps announced updates to BloodHound Enterprise that add new Attack Paths focused on Active Directory ...
5 months ago Helpnetsecurity.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
7 months ago Esecurityplanet.com
Three Ways to Chill Attacks on Snowflake - More than a month after a spate of data theft of Snowflake environments, the full scope of the incident has become more clear: at least 165 likely victims, more than 500 stolen credentials, and suspicious activity connected to known malware from ...
4 days ago Darkreading.com
CVE-2020-8022 - A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise ...
3 years ago
Active Directory Infiltration Methods Employed by Cybercriminals - Active Directory infiltration methods exploit vulnerabilities or weaknesses in Microsoft's Active Directory to gain unauthorized access. Active Directory is a central component in many organizations, making it a valuable target for attackers seeking ...
6 months ago Gbhackers.com
CVE-2019-3695 - A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools ...
4 years ago
CVE-2019-3696 - A Improper Limitation of a Pathname to a Restricted Directory vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module ...
4 years ago
Calling Home, Get Your Callbacks Through RBI - Following a brief introduction to the technology, we share our firsthand experiences when encountering RBI solutions and techniques the SpecterOps team have employed for establishing command and control to systems that proxy traffic through RBI ...
5 months ago Securityboulevard.com
East Texas hospital network can't receive ambulances because of potential cybersecurity incident - GetTime();if(!(u<=a&&d<=l throw new RangeError("Invalid interval");return r.inclusive?u<=l&&d<=a:ut||isNaN(t. Step):1;if(s<1||isNaN(s throw new RangeError("`options. Step):1;if(l<1||isNaN(l throw new RangeError("`options. GetTime()<=n throw new ...
7 months ago Cnn.com
CVE-2021-32804 - The npm package "tar" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file ...
2 years ago
CVE-2019-18904 - A Uncontrolled Resource Consumption vulnerability in rmt of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Public Cloud 15-SP1, SUSE Linux ...
4 years ago
7 Best Attack Surface Management Software for 2024 - Attack surface management is a relatively new cybersecurity technology that combines elements of vulnerability management and asset discovery with the automation capabilities of breach and attack simulation and applies them to an organization's ...
6 months ago Esecurityplanet.com
Cybersecurity Veteran Kevin Mandia Named General Partner of Ballistic Ventures - PRESS RELEASE. SAN FRANCISCO, June 26, 2024 /PRNewswire/ - Ballistic Ventures, the venture capital firm dedicated exclusively to funding and incubating entrepreneurs and innovations in cybersecurity, is pleased to announce that co-founder Kevin ...
1 week ago Darkreading.com
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
7 months ago Feeds.dzone.com
CVE-2022-36007 - Venice is a Clojure inspired sandboxed Lisp dialect with excellent Java interoperability. A partial path traversal issue exists within the functions `load-file` and `load-resource`. These functions can be limited to load files from a list of load ...
1 year ago
TISAX: new Catalogue ISA v6 available - ISA 6: The latest version of the ISA catalogue, published in October 2023, with many changes and improvements to address the challenges and needs of the industry. Key changes in ISA 6: New and revised controls to strengthen protection, detection, ...
6 months ago Sorinmustaca.com
Russia's Midnight Blizzard stole email of more Microsoft customers - Microsoft Patch Tuesday security updates for May 2024 fixes 2 actively exploited zero-days. Microsoft fixed two zero-day bugs exploited in malware attacks. CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities ...
1 week ago Securityaffairs.com
Critical unauthenticated RCE flaw in OpenSSH server - MUST READ. Critical unauthenticated remote code execution flaw in OpenSSH server. Expert released PoC exploit code for Veeam Backup Enterprise Manager flaw CVE-2024-29849. CISA adds Oracle WebLogic Server flaw to its Known Exploited Vulnerabilities ...
6 days ago Securityaffairs.com
New Relic CEO sets observability strategy for the AI age - The executive that replaced Gary Steele as CEO at Proofpoint when Steele left for Splunk has now followed Steele's path from cybersecurity to the helm of an observability company. Ashan Willy was appointed CEO at New Relic in December, a month after ...
1 week ago Techtarget.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)