Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation

The vulnerability, dubbed “Golden dMSA,” exploits a fundamental weakness in the newly introduced delegated Managed Service Accounts (dMSAs) that reduces complex cryptographic protections to a trivial brute-force attack requiring only 1,024 attempts. A critical design flaw in Microsoft’s latest Windows Server 2025 enables attackers to bypass authentication and generate passwords for all managed service accounts across enterprise networks. Instead of following normal dMSA authentication procedures that require machine identity validation, the Golden dMSA technique uses compromised cryptographic keys to generate valid passwords directly, rendering Credential Guard and similar protections irrelevant. Semperis Security Researcher Adi Malyanker discovered the vulnerability while analyzing the architecture of dMSAs, Microsoft’s flagship security innovation designed to revolutionize service account management in Windows Server 2025. Unlike traditional service accounts that rely on static passwords vulnerable to Kerberoasting attacks, dMSAs were engineered to bind authentication directly to authorized machines in Active Directory, eliminating credential theft by tying authentication to device identity rather than user-managed passwords. The Golden dMSA attack undermines this entire security model by exploiting a critical design flaw in the ManagedPasswordId structure used for password generation. By default, no security events are logged when KDS root keys are compromised, requiring administrators to manually configure System Access Control Lists (SACLs) on KDS root key objects to audit read access. However, the researchers emphasize that the impact can be extremely high, enabling attackers to bypass modern protections like Credential Guard and fundamentally challenge the assumed security benefits of machine-bound authentication. The attack operates at the forest level, meaning a single successful KDS root key extraction enables cross-domain lateral movement and compromise of every dMSA account across all domains within that forest. Next, they enumerate dMSA accounts throughout the Active Directory forest using specialized techniques that bypass restrictive Access Control Lists. Since KDS root keys have no expiration date, this access could theoretically last indefinitely, creating a persistent backdoor that survives typical security rotations and updates. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Semperis rates this vulnerability as moderate risk because exploitation requires possession of a KDS root key, which is only accessible to the most privileged accounts: Domain Admins, Enterprise Admins, and SYSTEM-level access. First, attackers extract cryptographic material from the Key Distribution Services (KDS) root key, which serves as the foundation for all managed service account passwords. Organizations can monitor for abnormal volumes of authentication requests targeting service accounts and unusual Ticket-Granting Ticket requests for dMSA accounts. Detection of Golden dMSA activity presents significant challenges for enterprise security teams.

This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 16 Jul 2025 14:25:10 +0000


Cyber News related to Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation

Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation - The vulnerability, dubbed “Golden dMSA,” exploits a fundamental weakness in the newly introduced delegated Managed Service Accounts (dMSAs) that reduces complex cryptographic protections to a trivial brute-force attack requiring only ...
10 hours ago Cybersecuritynews.com
Best Password Generators of 2024 to Secure Your Accounts - Overview of best password generators to secure online accounts. We have various password generators to help us protect our accounts and practical barriers to protect our sensitive information. We have compiled this list of the best password ...
1 year ago Cyberdefensemagazine.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Windows 10 Extended Security Updates Promised for Small Businesses and Home Users - Already common for enterprises, for the first time, individuals will also get the option to pay for extended security updates for a Windows operating system that's out of support. Windows 10 will stop getting free updates, including security fixes, ...
1 year ago Techrepublic.com
What Is Kerberos Authentication?: Implementing Effective Security Protocols - Kerberos is a vital security protocol that any serious computer user must be familiar with. It is an open standard that provides a secure way of verifying the identity of user across multiple systems. The Kerberos authentication protocol is a ...
2 years ago Heimdalsecurity.com
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
2 years ago Trendmicro.com
Passwordless Login: Effortless Authentication - Let's explore how passwordless login paves the way for seamless and secure user authentication, fostering trust and loyalty. The Password Dilemma Though conventional complex password-based authentication has long been a cornerstone of robust ...
1 year ago Feeds.dzone.com
PoolParty Process Injections, SysJoker, NetSupport RAT, & More: Hacker's Playbook Threat Coverage Round-up: December 2023 - In this version of the Hacker's Playbook Threat Coverage round-up, we are highlighting attack coverage for newly discovered or analyzed threats, including those based on original research conducted by SafeBreach Labs. SafeBreach customers can select ...
1 year ago Securityboulevard.com
Identity Reveal: Real-World Identity of Threat Actor Behind Golden Chickens Malware-as-a-Service Exposed - Researchers have identified the real-world identity of the threat actor behind Golden Chickens Malware-as-a-Service, known as Badbullzvenom. A 16-month-long investigation by eSentires Threat Response Unit revealed multiple instances of the ...
2 years ago Heimdalsecurity.com Cobalt Group Evilnum FIN6
6 Best Enterprise Password Managers for 2024 Rated - Password managers are security tools that store, manage, and share authorization credentials safely for individual users and groups. In this article, I evaluate the top password managers and their ability to deliver and support solutions for ...
1 year ago Esecurityplanet.com
Password Advice for the Rest of Us - Cisco Blogs - The key function you’re wanting out of a password manager is the ability to create passwords that are at least twenty (20) characters long, with all the typical mix of letters, numbers and symbols, as well as the ability to create a unique password ...
9 months ago Feedpress.me
Securden Password Vault Review 2024: Security, Pros & Cons - Securden Password Vault is a password management solution geared towards supervising multiple accounts and sensitive login credentials. Yes, Securden Password Vault can be accessed for free. If you're looking for an enterprise-level password solution ...
1 year ago Techrepublic.com
How to Share a Wi-Fi Password: A Step-by-Step Guide - You can unsubscribe at any ...
9 months ago Techrepublic.com
Understand the pros and cons of enterprise password managers - To counter these threats, corporate IT security teams are turning to business-grade password managers to help centralize and streamline password and credential management. A password manager is a credential vault that gives IT teams a unified digital ...
1 year ago Techtarget.com
Hardening Windows Servers - Top Strategies to Prevent Exploits in 2025 - By leveraging the default security enhancements in Windows Server 2025 alongside strategic implementations of Application Control, Attack Surface Reduction, and proper credential management, organizations can significantly reduce their risk exposure ...
2 months ago Cybersecuritynews.com
Open Source Password Managers: Overview, Pros & Cons - There are many proprietary password managers on the market for those who want an out-of-the box solution, and then there are open source password managers for those wanting a more customizable option. In this article, we explain how open source ...
1 year ago Techrepublic.com
Top 6 LastPass Alternatives for 2024 - LastPass is a popular choice for managing passwords and sensitive information for individuals and businesses. While the tool still enjoys global patronage, it's not a bad idea to consider other password managers that can serve as worthy alternatives ...
1 year ago Techrepublic.com
Windows 11 to let admins mandate SMB encryption for outbound connections - Windows 11 will let admins mandate SMB client encryption for all outbound connections, starting with today's Windows 11 Insider Preview Build 25982 rolling out to Insiders in the Canary Channel. SMB encryption provides data end-to-end encryption and ...
1 year ago Bleepingcomputer.com
Microsoft releases first Windows Server 2025 preview build - Microsoft has released Windows Server Insider Preview 26040, the first Windows Server 2025 build for admins enrolled in its Windows Insider program. This build is the first pushed for the next Windows Server Long-Term Servicing Channel Preview, which ...
1 year ago Bleepingcomputer.com
Protect your Active Directory from these Password-based Vulnerabilities - Deploying a security solution like Specops Password Policy enhances the protection of passwords, which are frequently exploited as an initial entry point by attackers. In this attack, the perpetrator, typically using a compromised low-level account ...
1 year ago Bleepingcomputer.com
Top 10 Best Passwordless Authentication Tools in 2025 - Auth0 provides a flexible authentication and authorization platform that supports passwordless login methods, enhancing security and user experience by eliminating the need for traditional passwords. Okta provides a robust identity and access ...
4 months ago Cybersecuritynews.com
How to Use Context-Based Authentication to Improve Security - One of the biggest security weak points for organizations involves their authentication processes. Context-based authentication offers an important tool in the battle against credential stuffing, man-in-the-middle attacks, MFA prompt bombing, and ...
1 year ago Securityboulevard.com
Selecting an Authentication Protocol for Your Business - Authentication protocols serve as the backbone of online security, enabling users to confirm their identities securely and access protected information and services. The protocols exchange information to verify the validity of the authentication ...
1 year ago Darkreading.com
Microsoft No Longer Selling Windows 10 Licenses Redirects to Windows 11 Product Pages - Marking an end to an era, Microsoft is no longer directly selling Windows 10 product keys on their website, instead redirecting users to Windows 11 product pages. This month, Microsoft began displaying an alert on their Windows 10 Home and Pro ...
2 years ago Bleepingcomputer.com
What is a one-time password? Definition from SearchSecurity - A one-time password is an automatically generated numeric or alphanumeric string of characters that authenticates a user for a single transaction or login session. An OTP is more secure than a static password, especially a user-created password, ...
1 year ago Techtarget.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)