In a groundbreaking presentation at Black Hat USA 2025, security researcher Dirk-jan Mollema revealed a suite of advanced lateral movement techniques that exploit the hybrid trust model between on-premises Active Directory (AD) and Microsoft Entra ID.
Despite recent hardening efforts, these techniques demonstrate that attackers with domain control can still subvert authentication, bypass multifactor protections, and quietly exfiltrate data—all without generating useful logs.
Microsoft’s hybrid identity design unifies multiple on-premises AD domains under a single Entra ID tenant.
While this flat structure simplifies user management, it also pools all synced accounts—regardless of their original domain—into one security boundary.
Attackers who gain full control of any on-prem AD environment can leverage Entra ID Connect credentials, federation services, or password hash synchronization configurations to issue valid authentication tokens for any hybrid user.
Because Entra ID treats all custom domains equally, compromise of a single synchronization component or federation key grants tenant-wide access.
The underlying Access Control Service issues long-lived, non-revocable JWT actor tokens trusted for delegation.
Recent patches have limited certain account-overwriting attacks and revoked service-principal modification rights, but many high-impact paths remain available.
Mollema detailed two primary methods for forging authentication tokens:
Furthermore, compromised Entra ID Connect servers expose both database-encrypted passwords and certificate-private keys.
Attackers can overwrite hybrid passwords, convert cloud-only accounts to hybrid, and assign arbitrary credentials to service principals.
Despite a 2024 permissions lockdown that removed many Graph API rights from the sync account, residual service principal privileges can still be abused for persistence and stealth.
Several of Mollema’s techniques exploit undocumented or poorly documented Graph API endpoints and internal policy configurations:
federatedIdpMfaBehavior—to accept or bypass MFA from a compromised AD FS instance. With Domain.ReadWrite.All privileges, they can also alter federation certificates, undermining future authentication flows.Mollema addressed that most of these “features” are by-design behaviours rather than software bugs, highlighted by Microsoft’s eventual classification of the Graph API impersonation vector as a vulnerability.
While some mitigations are now mandatory—such as splitting Exchange hybrid service principals and enforcing stricter API scopes—organizations must actively audit their hybrid configurations.
Monitoring Exchange-initiated audit logs with tailored KQL queries and rotating federation and SSO keys frequently are critical steps.
As hybrid cloud deployments remain ubiquitous, defenders must assume an attacker may already hold on-premises domain control.
Only by reducing trust assumptions, implementing rigorous least-privilege policies, and maintaining visibility on token issuance can enterprises close the gap between AD and Entra ID.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…