While designed to enhance security by preventing traditional credential theft attacks like Kerberoasting, security researchers have uncovered potential abuse vectors that could allow attackers to establish persistent access in Active Directory environments.
dMSAs were created to solve long-standing problems with traditional service accounts. Unlike standard accounts that require manual password management, dMSAs provide automatic credential management and link authentication directly to machine identities.
According to Microsoft documentation, “dMSA is a more secure and manageable approach to service account management compared to traditional service accounts”.
The technology allows administrators to migrate from conventional service accounts while disabling the original account’s password authentication, redirecting all requests through the Local Security Authority (LSA) using the new dMSA mechanism.
This feature was specifically designed to eliminate credential theft risks.
According to Matan Bahar, despite enhanced security controls, dMSAs can potentially be abused by attackers who have temporarily gained elevated privileges. The attack targets the Access Control Lists (ACLs) of the dMSA objects themselves.
The key vulnerability lies in the “Managed Service Accounts” container and its permission inheritance structure.
An attacker with domain administrator access, even temporarily, can modify ACLs to maintain access to dMSA accounts after their privileged access is revoked.
The attack begins by gaining “GenericAll” permissions on the Managed Service Accounts container:
While having “GenericAll” permissions on the container doesn’t automatically grant access to child objects, attackers can force inheritance down to all dMSA objects:
These commands establish persistent control over all existing and future dMSA objects. The attacker can then:
Organizations deploying Windows Server 2025 should implement these protections:
While dMSAs significantly improve service account security over traditional accounts, organizations must remain vigilant about potential abuse vectors.
According to the Report, the security improvements offered by dMSAs still outweigh the risks, particularly when proper monitoring and access controls are implemented.
As Microsoft continues to develop Windows Server 2025, additional security controls around dMSA management will likely emerge to address these newly discovered persistence techniques.
Vulnerability Attack Simulation on How Hackers Rapidly Probe Websites for Entry Points – Free Webinar
The post Abusing dMSA with Advanced Active Directory Persistence Techniques appeared first on Cyber Security News.
Whether you need new noise-canceling headphones or a neck fan to get you through the…
IGN's multi-day in-person fan event is set to showcase the biggest names in games and…
Whether you need new noise-canceling headphones or a neck fan to get you through the…
IGN's multi-day in-person fan event is set to showcase the biggest names in games and…
As a big LEGO fan, so much has caught my eye lately. From exciting new…
Back in October of 2025, XGIMI released its Titan 4K projector to rave reviews. This…
This website uses cookies.