Hackers Exfiltrating NTDS.dit File to Escalate Domain Access

Related

Eclipse Foundation Implements Mandatory Pre-Publish Security Checks for Open VSX Extensions

What happened The Eclipse Foundation announced it will begin enforcing...

Fake Dropbox Phishing Attack Harvests Credentials

What happened Security analysts are warning about a fake Dropbox...

Infostealer Campaigns Expand With Increased Tactics and Targeting

What happened Infostealer malware campaigns are expanding, with threat actors...

Chrome Vulnerabilities Include Arbitrary Code Execution and Sandbox Escape Flaws

What happened Multiple security vulnerabilities in Google Chrome were disclosed...

Share

What happened

Security researchers observed threat actors actively exfiltrating the NTDS.dit file from compromised Windows domain controllers to escalate access and conduct further compromise. According to the report, the NTDS.dit file, which contains Active Directory user hashes, credentials, and group policy information, was being copied from domain controllers and sent to attacker-controlled infrastructure following initial access. By obtaining the NTDS.dit, operators can extract credential material offline and attempt lateral movement with elevated privileges across the network. The activity was linked to a multi-stage intrusion in which initial footholds were obtained through undisclosed vectors, followed by deployment of tools that located and exfiltrated the sensitive AD database file. Researchers noted that after NTDS.dit exfiltration, subsequent steps included credential harvesting and use of the extracted credential material to extend the attack footprint within the environment.

Who is affected

Organizations with Windows Active Directory domain controllers that have been compromised are directly affected because the exfiltrated NTDS.dit file can be used by attackers to derive credentials and escalate privileges throughout the domain.

Why CISOs should care

The exfiltration of raw Active Directory credential stores highlights significant risk to identity and access management, as attackers with access to NTDS.dit can derive valid credentials and move laterally, undermining trust boundaries and escalating into full domain compromise.

3 practical actions

  • Audit domain controller access. Review logs and security controls for unauthorized access to domain controller files and credential stores.
  • Restrict admin privileges. Limit the number of accounts with rights to read AD database files.
  • Monitor sensitive file exfiltration. Employ network detection to flag large outbound transfers of directory or credential store files.