HomeCyber AttacksMicrosoft Patches A Important Entra ID Vulnerability Found by Dutch Hacker

Microsoft Patches A Important Entra ID Vulnerability Found by Dutch Hacker


Readers assist help Home windows Report. We might get a fee if you happen to purchase via our hyperlinks.

Learn our disclosure web page to search out out how are you going to assist Home windows Report maintain the editorial staff. Learn extra

With the evolving know-how, cybercriminals are discovering new methods to interrupt into techniques. In July, we lined incidents associated to cyberattacks on SharePoint servers, adopted by information that Microsoft busted the staff behind the RaccoonO365 instrument only a few days in the past.

However once in a while, a vulnerability seems that stands out from the remainder. In contrast to a typical data breach or a stolen password, this one might have opened the doorways to each Microsoft Entra ID tenant worldwide. A Dutch security researcher and hacker, Dirk-jan Mollema, found the flaw and defined the way it labored.

Effectively, the problem mixed two harmful flaws. First, a hidden “Actor tokens” that weren’t certain by security guidelines like Conditional Entry. Secondly, a validation error within the outdated Azure AD Graph API.

See also  Microsoft confirms Midnight Blizzard has entry to its supply code

When a hacker combines each, they may impersonate International Admins throughout organizations. In follow, this gave them the keys to the whole lot. It consists of emails, recordsdata in SharePoint, Azure sources, and even BitLocker restoration keys.

What made this a risk was its invisible nature. The outdated API lacked correct logging, so suspicious requests wouldn’t present up within the sufferer’s setting. In different phrases, any malicious exercise would seem like a legit admin at work.

Effectively, the excellent news is that Mollema reported the problem to Microsoft instantly. The corporate has since patched the bug and added detection guidelines for security groups. The vulnerability was later tracked as CVE-2025-55241, with Microsoft noting that its telemetry confirmed no indicators of abuse.

by way of: Wired | Techzine


See also  Iranian Hackers Utilizing MuddyC2Go in Telecom Espionage Attacks Throughout Africa

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular