Yuval Gordon
@YuG0rd
Security Researcher at Akamai. Opinions are my own.
๐ We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it ๐คทโโ๏ธ Read Here - akamai.com/blog/security-โฆ

We just released a new beta build for PingCastle on GitHub to detect the new BadSuccessor risk that @YuG0rd found! github.com/netwrix/pingcaโฆ Code is in the BadSuccessor branch.
Another Monday. Another week ofโฆ endless emails, annoying meetings, and oh look, a three-headed monkey behind you! Now that we have your attention, we can unveil the agenda for #RomHack2025 romhack.io/romhack-conferโฆ #infosec #securityconference
If you can't beat them, ban them ๐ Malicious Cryptominers can be tough to dismantle - but we found a way. ๐ By exploiting common mining topologies, Akamai researchers were able to ban attackers from their mining pools and shut down their operations. akamai.com/blog/security-โฆ
ืคืื ืืฉืจืื: ืืงืืืืช ืฉื ืืชื ืืชืจืื ืืื ืืืืืจืื ืืืฉ ืืื ืืฉืืื ื benevity? ๐ฎ๐ฑ ืืฉืื ืื ืชืขืืจื ืื ืืืคืืฅ ืืช ืืืืืขื
I'm super happy to announce an operationally weaponized version of @YuG0rd's BadSuccessor in .NET format! With a minimum of "CreateChild" privileges over any OU it allows for automatic escalation to Domain Admin (DA). Enjoy your inline .NET execution! github.com/logangoins/Shaโฆ
We did an analysis across participating customers & found that ~96% had > 1 user that has the necessary permissions to be susceptible to this attack, but only ~3% had a 2025 server. So there are a lot of orgs that have the opportunity to resolve this issue before they bring aโฆ
So, in a lot of similar cases I would agree with you. But (FWIW) in this case I think the balance of equities is in favor of some kind of disclosure. Because not many orgs will have moved to 2025 yet on domain controllers and they should be informed to probably wait for a fix.
Today we unveil BadSuccessor - a new no-fix Active Directory privilege escalation technique. We will explore the recently introduced dMSA feature, and show how it enables turning a very common, seemingly benign permission, into a full domain take over. akamai.com/blog/security-โฆ