9.5 C
New York
Tuesday, March 11, 2025

Hackers use Home windows RID hijacking to create hidden admin account


Hackers use Home windows RID hijacking to create hidden admin account

A North Korean risk group has been utilizing a method referred to as RID hijacking that methods Home windows into treating a low-privileged account as one with administrator permissions.

The hackers used a customized malicious file and an open supply device for the hijacking assault. Each utilities can carry out the assault however researchers at South Korean cybersecurity firm AhnLab say that there are variations.

How RID hijacking works

The Relative Identifier (RID) in Home windows is a part of the Safety Identifier (SID), a novel tag assigned to each consumer account to tell apart between them.

RID can take values that point out the account’s degree of entry, comparable to “500” for directors, “501” for visitor accounts, “1000” for normal customers, and “512” for the area admins group.

RID hijacking happens when attackers modify the RID of a low-privilege account to match the worth of an administrator account, and Home windows will grant it elevated entry.

Nonetheless, performing the assault requires entry to the SAM registry, so the hackers have to first breach the system and achieve SYSTEM entry.

RID hijacking process
RID hijacking course of
Supply: ASEC

Andariel assaults

ASEC researchers, AhnLab’s safety intelligence middle, attribute the assault to Andariel risk group, which has been linked to North Korea’s Lazarus hacker group.

The assaults start with Andariel having SYSTEM entry on the goal through the exploitation of a vulnerability.

The hackers obtain the preliminary escalation through the use of instruments comparable to PsExec and JuicyPotato to launch a SYSTEM-level command immediate.

Though SYSTEM entry is the very best degree on Home windows, it doesn’t enable distant entry, can not work together with GUI apps, may be very noisy and prone to be detected, and can’t persist between system reboots.

To handle these points, Andariel first created a hidden, low-privilege native consumer through the use of the “web consumer” command and including the ‘$’ character on the finish.

In doing so, the attacker ensured that the account shouldn’t be seen by way of the “web consumer” command and could be recognized solely within the SAM registry. Then they carried out the RID hijacking to extend permissions to admin.

Hidden Andariel account on compromised Windows system
Hidden Andariel account on Home windows system
supply: AhnLab

In keeping with the researchers, Andariel added their account to the Distant Desktop Customers and Directors teams.

The RID hijacking required for that is potential by way of Safety Account Supervisor (SAM) registry modifications. The North Koreans use customized malware and an open-source device to carry out the modifications.

Tools
Supply: ASEC

Though SYSTEM entry permits admin account creation straight, sure restrictions might apply relying on the safety settings. Elevating the privileges of normal accounts is way stealthier and more durable to detect and cease.

Andariel additional makes an attempt to cowl its tracks by exporting the modified registry settings, deleting the important thing and the rogue account, after which re-registering it from a saved backup, permitting reactivation with out showing in system logs.

To mitigate dangers for RID hijacking assaults, system admins ought to use  Native Safety Authority (LSA) Subsystem Service to test for logon makes an attempt and password modifications, in addition to forestall unauthorized entry and modifications to the SAM registry.

Additionally it is advisable to limit the execution of PsExec, JuicyPotato, and comparable instruments, disable the Visitor account, and shield all current accounts, even low-privileged, with multi-factor authentication.

It’s value noting that RID hijacking has been recognized since at the very least 2018 when safety researcher Sebastián Castro offered the assault at DerbyCon 8 as a persistence approach on Home windows techniques.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles