TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A hacked Microsoft test account was assigned admin privileges

247 pointsby taimurkazmiover 1 year ago

15 comments

chc4over 1 year ago
Reminds me of an ancient Roblox hack I heard about, where they had a non-production staging version of the website that users could sign up for (with accompanied "nothing here is permanent" banner). A new administrator user account was added to production, and someone was able to register the same staging site username and use it's cookies and tokens in order to hijack the production account and compromise the site. I can't imagine these types of problems are that uncommon: if you generate cryptographic tokens based off username or user ID that doesn't have a different secret for production/staging, if your staging site talks to other external services that mix up permission grants for production, etc.
评论 #39160967 未加载
评论 #39161437 未加载
kjellsbellsover 1 year ago
The dev&#x2F;production boundary in large companies is much more porous than people like to think. Consider a typical day: you log in to your pc, check email, then use the same creds to log in to your azure portal (after all, all backed by the same tenant). Your account is linked to github and your cloud account.<p>Groups and teams get created all over the place, with mysterious permissions, just so that you can play in Teams, or OneDrive, and these persist in the company directory almost indistinguishable from security groups.<p>Sometimes you get automated emails asking you if you still need something, but the messages are opaque, and in a really big company there&#x27;s no-one you can really ask (helpdesk takes 2 days to get back to you, and what are you gonna do, hit up John Savill on Twitter?), so you hit ok and try to carry on.<p>Inevitably, the fabric starts to rend, and an attacker gets lucky at a weak spot and can jump sideways through the tenant to get what they want.<p>As a wise CISO once said, hackers dont break in, they log in.
评论 #39163286 未加载
wolverine876over 1 year ago
&gt; Kevin Beaumont—a researcher and security professional with decades of experience, including a stint working for Microsoft—pointed out on Mastodon that the only way for an account to assign the all-powerful full_access_as_app role to an OAuth app is for the account to have administrator privileges. “Somebody,” he said, “made a pretty big config error in production.”<p>Without knowing details of the system: That would not seem to be the problem, and I&#x27;m surprised someone with expertise would say it is. There should be no way for someone to make that error. Whoever designed it and whoever administers it should have made it impossible; they would be responsible.<p>If you build and operate a factory with a button that electrocutes everyone inside, and someone mistakenly presses that button, it&#x27;s clear where the problem is.
评论 #39158953 未加载
评论 #39158779 未加载
taimurkazmiover 1 year ago
This is what is commonly known in the cybersecurity industry as a &quot;whoopsie&quot;
nimbiusover 1 year ago
I like how we have all these cool security certifications that can quantifiably protect companies and industries from calculable risk and yet somehow the well reasoned and thoughtful best practice of a $36 book on amazon goes totally ignored...<p>Its almost like security is some sort of ribbon campaign.
评论 #39159669 未加载
评论 #39163156 未加载
评论 #39159604 未加载
cratermoonover 1 year ago
This is why I hate when I go to a new gig and someone just assigns me a bunch of rights, &quot;because it&#x27;s easier&quot;. No, don&#x27;t do that. Not only are you exposing your company to breaches, you&#x27;re giving me responsibilities I don&#x27;t want. I could make a mistake and screw something important up, or something could get hacked and people might think it was me, because I have privileges to do it.
评论 #39158711 未加载
Arainachover 1 year ago
Missing in this post: how do the authors define &quot;production&quot; if a &quot;non-production&quot; account has admin rights to the prod domain?
评论 #39159009 未加载
orionblastarover 1 year ago
I got one better, worked at a law firm, managers and partners were given admin access to everything. Default password after reset is &quot;passme&quot; because password was too long to remember. They are supposed to reset their password after login into the server. Hackers got a few of their accounts and started messing with things and stealing data. Even some test accounts had admin status. I&#x27;m glad I don&#x27;t work there anymore, I was a programmer analyst and only had admin access to my PC to make Visual BASIC 6.0 work.
weppleover 1 year ago
This pattern is the rule rather than the exception across MS ecosystems, but to see Microsoft itself do it is particularly egg-on-face.<p>MS security has put significant effort into tooling and best practice documentation to try and prevent these types of major screw-ups
评论 #39162117 未加载
评论 #39159252 未加载
coldcodeover 1 year ago
I once worked for a company that stored all of its passwords for production servers and databases in a text file in the code repository, all because the chief architect didn&#x27;t want to have to remember any passwords. Pointing out how stupid that was to the CTO, got me a statement &quot;we trust our employees&quot; and &quot;we passed our security audit&quot;. My face is still hurting from the facepalm.
评论 #39169265 未加载
rvbaover 1 year ago
KGB captured a NSA account?<p>Access to everything means it was not a planned disclosure.<p>Also why does MS not design its systems to simply disallow one person to have such priviledges? They are attacked by state actors and have moles inside...
ratg13over 1 year ago
Rather curious now to know how many global admins Microsoft has.
jcmeyrignacover 1 year ago
Why is this considered a &quot;gaffe&quot;? It may be the act of a mole who works at Microsoft as an admin.
评论 #39160780 未加载
jongjongover 1 year ago
Now Russia is probably extorting Microsoft with all the dirt they uncovered. I hope at least they will make the information public after they&#x27;re done.
b0ner_t0nerover 1 year ago
Why didn&#x27;t Microsoft Copilot catch this?