Having done ESAE and hardened AD Deployments, you're definitely making a choice between availability and security. Between the PAW system, the tiered isolation, and everything that goes with it... the burden of overhead is brutally high.I haven't worked as a Windows sysadmin in 15 or so years, as my first "real" job, and I knew even then that NTLM was insecure. There was plenty of guidance from Microsoft on how to secure AD properly and avoid all of these problems. Any competent, properly-resourced IT department would have been able to do this, which strongly implies senior leadership didn't consider it to be a priority (let me guess, offshored IT handed out to either the lowest bidder or the CIO's nephew...).
Maybe jail time for CEOs whose companies fuck up this badly would prevent some of these issues, but somehow I doubt it.
What's the first thing that happens when there is a new CEO?
They cut the IT budget...
I think this also rings true to the story from yesterday about Boar's Head meat plants being filthy. Is it really worth the money you saved to have a disaster in the end? SMH
One wonders what would have happened had Microsoft simply shipped the product with the options that allow kerberoasting turned off by default, requiring the receiving company to deliberately turn them on to get back their obsolete functionality, instead of the other way around.Gold and Medin said Wyden’s account of the breach shows Ascension failed to implement this and other standard defensive measures, including network intrusion detection.
Yes, NTLM is not secure, but for most organizations there is not a way to totally disable NTLMv2. Microsoft has been working towards this, and there was a lot of information posted in 2023, but it has been silent since then. Even some Microsoft provided services like the print spooler are dependent on NTLM.I haven't worked as a Windows sysadmin in 15 or so years, as my first "real" job, and I knew even then that NTLM was insecure. There was plenty of guidance from Microsoft on how to secure AD properly and avoid all of these problems. Any competent, properly-resourced IT department would have been able to do this, which strongly implies senior leadership didn't consider it to be a priority (let me guess, offshored IT handed out to either the lowest bidder or the CIO's nephew...).
Maybe jail time for CEOs whose companies fuck up this badly would prevent some of these issues, but somehow I doubt it.
I would buy that except I know just enough about validated systems (e.g. equipment the FDA has signed off on) to know that the hospital has fucked up if it requires network connectivity to AD for actual medical equipment.Microsoft makes tiny non-backward compatible change: "The new version breaks us so our hospital is still using Windows XP and is insecure"
Microsoft keeps in backward capability features: "Windows is insecure and it's Microsoft's fault"
(I'm actually MSFT employee in an unrelated part of the company with no insider knowledge of this situation, but this sort of drama is so repetitive and there doesn't seem to be a winning move here).
You're not totally wrong. If you haven't configured the right mitigations, the easiest way to prevent this is having a 15 character password.Edit: I was wrong.
Doesn’t NTLM use the LAN Manager hashing algorithm that splits a 14 character password into two half 7 character passwords that are then hashed?
And that’s why Medin’s maths is wrong? Possibly leaving a 10 character password as two 5 character ones?
I had my 14 random character password cracked by a malicious, power-tripping sysadmin in 2008.
If Microsoft disabled this, they could easily break critical applications for organizations. They could break older medical device equipment, manufacturing/production line equipment, and ERP systems that could bring organizations to a halt. It is the 3rd party products or applications that companies haven't updated in years or decades that are the primary issue here. I'm sure Microsoft has the telemetry behind this to understand how it could break certain organizations.Microsoft's defense is obvious and already discussed in the article: "we issued guidance telling people what to do, so it's not our fault that people don't listen."
The issue is that, as a provider of a massive infrastructure product, Microsoft needs to contend with the reality that most people simply don't read. Of those who do, only a small portion will have the time, inclination, or resources to harden a(n often legacy) network according to constantly-updating advice, especially when you factor in the pain point of retraining users.
Governments face a similar problem when designing laws. If everyone simply behaved, then we'd have no need for them. The presumption that enough people won't behave (maliciously or due to incompetence) as to cause aggregate dangers/harms is enough justification to introduce and enforce rules.
Big companies want the benefits of being "big" without taking responsibility for being the referee. And while in a narrow sense you can make an argument for that, you'll never see any executives admitting "our product is good unless you don't follow x, y, z recommendations published regularly unless there's a zero-day".
My experience is that no password scheme permits close to all printable ASCII characters - those I’ve encountered allow maybe 72 (upper/lower alphas, numbers, and perhaps 10 “specials”). Even if all were permitted, there is no way a human could memorize that, so a password manager would be required, and I’ve never encountered that being mandated (or likely even allowed) in a corporate setting. I’m surprised that a security expert would call for such passwords - I guess the following XKCD needs to be dragged out again:Medin’s math is based on the number of password combinations possible with a 10-character password. Assuming it used a randomly generated assortment of upper- and lowercase letters, numbers, and special characters, the number of different combinations would be 9510—that is, the number of possible characters (95) raised to the power of 10, the number of characters used in the password.
Microsoft makes tiny non-backward compatible change: "The new version breaks us so our hospital is still using Windows XP and is insecure"
Microsoft keeps in backward capability features: "Windows is insecure and it's Microsoft's fault"
(I'm actually MSFT employee in an unrelated part of the company with no insider knowledge of this situation, but this sort of drama is so repetitive and there doesn't seem to be a winning move here).
I mean.. why would you want regular AD updates? There really aren't that many new features and every update is an incredible risk that has to be tested very carefully and contains the chance for unknown bugs or exploits.Part of Microsoft's responsibility is not making some of the insecure options enabled by default, but part of it is investing in the AD product itself.
AD2025 is clearly just a heartbeat update, AD hasn't had serious work done on it in years as Microsoft tries to drag everyone kicking and screaming into the cloud
My experience is that no password scheme permits close to all printable ASCII characters - those I’ve encountered allow maybe 72 (upper/lower alphas, numbers, and perhaps 10 “specials”). Even if all were permitted, there is no way a human could memorize that, so a password manager would be required, and I’ve never encountered that being mandated (or likely even allowed) in a corporate setting. I’m surprised that a security expert would call for such passwords - I guess the following XKCD needs to be dragged out again:
Because the world evolves and I expect products to evolve with it? Best practices evolve with time and its possible to follow guidance from Microsoft and then lock yourself into a path that prevents you from being able to meet the challenges of a modern threat landscape.I mean.. why would you want regular AD updates? There really aren't that many new features and every update is an incredible risk that has to be tested very carefully and contains the chance for unknown bugs or exploits.
The last really useful AD update I can think of were MSAs - which really made a big difference. But apart from that?
And changing defaults on existing infrastructure particularly with AD seems incredibly dangerous. AD is installed on so many different configurations in so many critical environments that probably still include ancient systems that haven't been updated in years. Just doesn't seem like a practical approach.
Much better to provide explicit guidance and best practices for how to secure your system, which means you can test and configure things separately and in your own time.
And Microsoft has a ton of information available there and it would've been totally possible to configure the system in such a way that the attack couldn't have worked.
No, I'd say the real problem is that large companies are starving their IT departments to death and are trying to be cheap as possible when it comes to security, because even now I doubt any of the responsible C-suite people will have to fear dire consequences.
Fair enough, after writing the post I remembered the rather sorry state of 2FA too.Because the world evolves and I expect products to evolve with it? Best practices evolve with time and its possible to follow guidance from Microsoft and then lock yourself into a path that prevents you from being able to meet the challenges of a modern threat landscape.
As an example:
Let's take a look at the "State of the art" design in 2003 - 2006 when most companies stood up their AD envs or did a major rebuild coming off of NT Domain Services.
"Empty root" was recommended heavily. there was a schism in MCS where some folks recommended Empty root and some recommended SFSD.
If Microsoft couldn't come to a consensus... well, that says something doesn't it? So you build a system following the recommendations and documentation that is available to you on TechNet/MSDN.
(Empty root for those unfamiliar is where you have an empty root domain and then put everything in a child domain, this was designed to mitigate a specific kind of attack and some issues that are no longer applicable. It made some sense in the NT days, but its no longer relevant)
Now it's a millstone around organizations who are told "You need to stand up a new domain and migrate all your objects to it" which would be great if it wasn't a miserable process that can destroy productivity and access if done even slightly wrong.
That's the only way out of a recommended decision from 2003. New domain. No way to fix that.
Features that would be nice:
Why is the only MFA option in On-Prem AD out of the box "Smart Card" instead of the myriad of options we have available to us today?
(Because it's a major selling point to moving to AAD)
Why can't I officially rotate my DPAPI key in 2025?
Why is Microsoft's answer "New Domain!" to a key rotation that's necessary after a TA has taken the ntds.dit file or compromised a DC?
That's true for maintenance of existing systems, however what I understoood (possibly incorrectly) is that these insecure cyphers were and are still today enabled by default for new AD installations and deployments.If Microsoft disabled this, they could easily break critical applications for organizations. They could break older medical device equipment, manufacturing/production line equipment, and ERP systems that could bring organizations to a halt. It is the 3rd party products or applications that companies haven't updated in years or decades that are the primary issue here. I'm sure Microsoft has the telemetry behind this to understand how it could break certain organizations.
Your view if this particular issue is way too narrow.
I'm going to be charitable here and say that it's because Smart Card is standardized and good security. It's better than a phishable TOTP, and don't get me started on SMS codes![snip]
Why is the only MFA option in On-Prem AD out of the box "Smart Card" instead of the myriad of options we have available to us today?
(Because it's a major selling point to moving to AAD)
The ability of a single compromised Ascension-connected computer to bring down the health giant’s entire network in such a devastating way is the strongest indication yet that the company failed its patients spectacularly. Ultimately, the network architects are responsible,
<Waves> We overlapped there at some point then. Same experience I had, and shared above. Praying to God is not a security strategy.Ascension’s IT services and support went to shit when they offshored almost all IT jobs to an incompetent company based out of India.
I was a sysadmin for ascension from 2015 to 2020 when they fired everyone and even asked some of us to train our overseas replacements.
I came back as a contractor for a couple years after layoffs with 3 times the workload and a fraction the number of IT department members here in the states.
I sure hope ascension realizes their mistakes and re-shores the jobs in the US. I wonder if this ransomware incident could have been avoided if ascension hadn’t laid off nearly every competent IT employee.
I appreciate the challenge of dealing with ancient products and a customer base that refuses to move on, but in this, the issue is over 10 years old and Microsoft is slow walking it because it's on-premise and doesn't care about it.Microsoft makes tiny non-backward compatible change: "The new version breaks us so our hospital is still using Windows XP and is insecure"
Microsoft keeps in backward capability features: "Windows is insecure and it's Microsoft's fault"
(I'm actually MSFT employee in an unrelated part of the company with no insider knowledge of this situation, but this sort of drama is so repetitive and there doesn't seem to be a winning move here).
Security and privacy should never be an afterthought when developing secure software, a formal process must be in place to ensure they're considered at all points of the product's lifecycle. Microsoft's Security Development Lifecycle (SDL) embeds comprehensive security requirements, technology-specific tooling, and mandatory processes into the development and operation of all software products. ... Now, 20 years later, the SDL approach continues to be fundamental to how we develop our products and services.