BadSuccessor: Exploiting dMSA for Active Directory Privilege Escalation

Listen to this Post

Featured Image
Akamai Technologies researcher Yuval Gordon uncovered a critical Active Directory exploit called BadSuccessor, which abuses delegated Managed Service Accounts (dMSA) to escalate privileges. By creating and manipulating a dMSA object, an attacker can “Succeed” any user, inheriting their permissions.

Key Risks:

  • Steal NTLM hashes and Kerberos keys (including krbtgt).
  • Inherit and abuse the victim’s permissions.
  • Bypass traditional detection (no DC code execution, no `ntds.dit` access, no RPC calls).

Critical Findings:

✅ Works in default AD configurations.

✅ 91% of environments allow non-Domain Admins to execute this attack.

🚨 No patch available—mitigation relies on proactive hardening.

PoC on GitHub: Akamai BadSuccessor Exploit
Full Research: BadSuccessor: Abusing dMSA

You Should Know: Mitigation & Detection Steps

1. Identify Vulnerable Permissions

Check for users with `msDS-GroupMSAMembership` write permissions:

Get-ADObject -Identity "CN=System,DC=domain,DC=com" -Properties msDS-GroupMSAMembership | Select-Object msDS-GroupMSAMembership

2. Restrict dMSA Delegation

Remove unnecessary write permissions:

Set-ADObject -Identity "CN=System,DC=domain,DC=com" -Replace @{ "msDS-GroupMSAMembership" = "RestrictedPrincipals" }

3. Monitor Suspicious dMSA Modifications

Enable Windows Event ID 5136 (Directory Service Changes) and filter for:

<QueryList>
<Query Id="0" Path="Security">
<Select Path="Security">
[EventData[Data[@Name='ObjectClass'] = 'msDS-GroupManagedServiceAccount']]
</Select>
</Query>
</QueryList>

4. Block NTLM & Enforce Kerberos Armoring

Disable NTLM where possible:

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name "LmCompatibilityLevel" -Value 5

Enable Kerberos AES Encryption:

Set-ADAccountControl -Identity "User" -KerberosEncryptionType AES256

5. Hunt for Anomalous dMSA Activity

Use Sigma Rule to detect exploitation:

title: Suspicious dMSA Modification 
description: Detects unauthorized dMSA changes 
logsource:
product: windows 
service: security 
detection:
selection:
EventID: 5136 
ObjectClass: msDS-GroupManagedServiceAccount 
condition: selection 

What Undercode Say

This exploit underscores weak delegation controls in Active Directory. Since Microsoft hasn’t patched it, defenders must:
– Audit dMSA permissions regularly.
– Restrict who can modify msDS-GroupMSAMembership.
– Assume breach—monitor for hash theft & lateral movement.

Expected Output:

[+] dMSA Exploit Detected: Unauthorized privilege escalation attempt via BadSuccessor. 
[+] Mitigation Applied: Restricted dMSA delegation & enforced Kerberos AES. 

Prediction:

⚠️ APT groups will weaponize this within 3 months—patchless exploits are gold for ransomware operators.

Relevant Links:

References:

Reported By: Mthomasson When – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram