๐—ง๐—ต๐—ฒ ๐—š๐—ผ๐—น๐—ฑ๐—ฒ๐—ป ๐—ฆ๐—”๐— ๐—Ÿ ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ: ๐—” ๐—ฆ๐˜๐—ฒ๐—ฝ-๐—ฏ๐˜†-๐—ฆ๐˜๐—ฒ๐—ฝ ๐—š๐˜‚๐—ถ๐—ฑ๐—ฒ.

Arafat Ashrafi Talha
2 min readJan 17, 2024

--

Golden SAML was one of the major techniques used by the threat actor as part of the SolarWinds attack by compromising the SAML signing certificate using their Active Directory privileges.

Collected.

Golden SAML was one of the major techniques used by the threat actor as part of the SolarWinds attack by compromising the SAML signing certificate using their Active Directory privileges.

An attacker must first gain administrative access to the ADFS server and extract the necessary certificate and private key to successfully leverage Golden SAML.

Once these privileges are obtained, the attack will proceed according to the following steps:

๐—œ๐—ป๐—ถ๐˜๐—ถ๐—ฎ๐—น ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ž๐—ฒ๐˜† ๐—˜๐˜…๐˜๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ผ๐—ป: The attacker first accesses the ADFS (Active Directory Federation Services) server and extracts the private key and certificate.

๐—ง๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ๐˜€ (๐—ฒ.๐—ด., ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ฒ): The user (in this case, the attacker) attempts to access a federated service, such as Microsoft Office.

๐—ฅ๐—ฒ๐—ฑ๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ณ๐—ผ๐—ฟ ๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: The Service Provider (SP) redirects the attacker to ADFS for authentication.

๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—•๐˜†๐—ฝ๐—ฎ๐˜€๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—™๐—ผ๐—ฟ๐—ด๐—ฒ๐—ฑ ๐—ฆ๐—”๐— ๐—Ÿ ๐—ฅ๐—ฒ๐˜€๐—ฝ๐—ผ๐—ป๐˜€๐—ฒ: Hereโ€™s where the โ€˜goldenโ€™ aspect comes into play. The attacker bypasses ADFS #authentication by signing a forged #SAML response using the stolen certificate and key.

๐—š๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€: This forged SAML response is then presented to the desired service, granting the attacker access.

Reco AI-driven platform effectively combats Golden SAML attacks by enhancing visibility and control in SaaS environments, utilizing key features like Identity & Access Governance and SaaS Detection & Response to prevent unauthorized access and certificate exploitation.

--

--

Arafat Ashrafi Talha
Arafat Ashrafi Talha

Written by Arafat Ashrafi Talha

M.Sc. in Advanced Networking & Cyber Security | CEHv12 | Cybersecurity Enthusiast | Connect on LinkedIn: linkedin.com/in/arafat-ashrafi-talha

No responses yet