Hackers Exploit Microsoft Access Feature to Steal Windows User’s NTLM Tokens

by Esmeralda McKenzie
Hackers Exploit Microsoft Access Feature to Steal Windows User’s NTLM Tokens

Hackers Exploit Microsoft Access Feature to Steal Windows User’s NTLM Tokens

Hackers Abuse Microsoft Entry

Microsoft Entry is a relational database management system developed by Microsoft that enables users to retailer and build up records.

Hackers purpose it on legend of vulnerabilities in Entry also can moreover be exploited to blueprint unauthorized receive entry to to databases, compromising mute records.

EHA

Cybersecurity researchers at Checkpoint impartial impartial as of late learned that hackers are actively abusing or exploiting the Microsoft Entry feature to take hang of House windows users’ NTLM tokens.

Hackers Exploit Microsoft Entry

Microsoft’s 1993 NTLM is an outdated, inform-response authentication protocol, and the users web responses from a saved NTLM hash, presenting a security topic.

Here below, now we possess mentioned the total attacks in opposition to NTLM which would possibly perchance be favorite:-

  • Brute-force attack
  • Pass-the-hash attack
  • Relay attack

Mitigations in opposition to NTLM attacks existed in protocols like Kerberos sooner than NTLM’s introduction.

Blocking outbound web site visitors on NTLM ports (139 and 445) is a quit-hole resolution, however a brand sleek plan using MS-Entry “Entry Link Tables” can bypass this defense, focusing on interior users straight.

Linked tables in MS Entry allow efficient connections to exterior databases like a long way away SQL servers. Activating the feature involves clicking ‘ODBC Database’ below ‘External Data.’

Hackers Abuse Microsoft Entry
ODBC Database (Source – Checkpoint)

This applies to all Place of job versions, with an quite quite quite a bit of possibility for a one-time download of a long way away tables treated as native on account of this truth.

Deciding on ‘SQL Server’ as the ODBC source, the person then chooses an authentication plan and can leave the port as default or decide an odd one, like port 80.

Document

Offer protection to Your Storage With SafeGuard

Is Your Storage & Backup Systems Fully Net? – Watch 40-2nd Tour of SafeGuard

StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities all over hundreds of storage and backup devices.

An SQL server can listen on port 80, although it’s keen. The linked desk appears to be like within the patron’s checklist if authentication is winning and reads the CheckPoint characterize.

By clicking it, a connection to the a long way away database is established, and the person’s House windows credentials are dilapidated to authenticate with the SQL server.

Hackers Abuse Microsoft Entry
Dialogue field for picking the server’s IP address, port, and protocol (Source – Checkpoint)

To weaponize, an attacker objects up a server on port 80, puts its IP within the server alias field, and sends the file to the victim.

The attacker-managed server can create an NTLM relay attack if the victim opens the file and clicks the desk. Whereas getting the victim to open and click is traumatic, MS-Entry macros would possibly perchance perchance automate it.

Security facets like safe question don’t apply to easy MS-Entry macros, doubtlessly exposing users to dangers.

Microsoft Entry is an OLE linking server on House windows, enabling other apps to quiz object handling. It functions like embedding an image in MS Discover, where MS Paint processes it for hiss.

Similarly, a .accdb file in MS Discover acts as an auto-downloadable OLE object, handled by MS Entry via port 80/tcp.

Mitigations

Here below, now we possess mentioned the total mitigations in actual fact handy by the researchers:-

  • Decide for a “instruct-wide awake” firewall—it goes beyond destination port tests, incorporating packet inspection for enhanced security.
  • Disable MS-Entry macros or uninstall them if needless for your Place of job suite.
  • Aquire sure to no longer open the attachments received from unknown or suspicious sources.
  • Always use a sturdy security resolution for enhanced security.

Source credit : cybersecuritynews.com

Related Posts