Source: BleepingComputer
Author: Sponsored by Specops Software
URL: https://www.bleepingcomputer.com/news/security/why-changing-passwords-doesnt-end-an-active-directory-breach/
ONE SENTENCE SUMMARY:
Password resets alone may not evict attackers in AD/hybrid Entra ID due to caching, sync delays, tickets, sessions, permissions.
MAIN POINTS:
- Changing a password doesn’t instantly invalidate old credentials across all authentication paths.
- Windows cached password hashes can allow offline logon using pre-reset credentials.
- Hybrid setups add Entra ID synchronization delays where old passwords may still work.
- Post-reset states vary depending on device reconnection and successful new logons.
- Pass-the-hash attacks reuse captured hashes even after passwords are changed.
- Kerberos tickets keep sessions alive without re-entering passwords after resets.
- Service accounts’ long-lived, privileged credentials provide resilient attacker fallback access.
- Golden and Silver Ticket attacks bypass password checks by forging Kerberos tickets.
- ACL abuse and AdminSDHolder modifications can persist privileges despite password changes.
- Effective eviction needs session termination, ticket purging, KRBTGT resets, rotations, and directory auditing.
TAKEAWAYS:
- Treat password resets as one control within broader incident response, not final remediation.
- Reduce reset-gap exposure by forcing sync and updating endpoint cached credentials.
- Kick attackers out by terminating sessions and clearing Kerberos tickets on affected systems.
- Rotate privileged and service-account credentials to remove reliable persistence mechanisms.
- Audit AD changes—memberships, delegated rights, ACLs, privileged roles—to eliminate hidden backdoors.