Quick Thread - Golden SAML (I am late to the party, I know) but thought some might find it useful.

Firstly, what is Golden SAML?

One of the major techniques used by the threat actor as part of the SolarWinds attack, was compromising the Security Assertion Markup Language
(SAML) signing certificate, using their Active Directory privileges. CISA explained that “once this is accomplished, the adversary creates unauthorized but valid tokens and presents them to services that trust SAML tokens from the environment. These tokens can then be used to
used to access resources in hosted environments, such as email, for data exfiltration via authorized application programming interfaces (APIs)”

The “Golden SAML” attack technique enables attackers to forge SAML responses and bypass ADFS ( https://docs.miniorange.com/articles/what-is-adfs) authentication
There is a Golden SAML research video here from @infenet -

There is a useful thread here - https://twitter.com/MalwareJake/status/1341539076713885697?s=20 which talks about the recently disclosed abuse of SAML by attackers to “bypass” MFA.
If I missed anything, please add it to the thread. 😀
You can follow @blueteamblog.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.