What CPAs Should Know About Active Directory

By Susan Firriolo, CPA, CISA, Pet Rescue 990 Project  – July 27, 2022
What CPAs Should Know About Active Directory

Active directory (AD) is a database in every Microsoft server that stores infor­mation about devices, users, applications, shared files, permissions and other things on a network. AD is very complicated; some IT professionals do not entirely understand it. So why do CPAs need to know about it? Because it’s another point of vulnerability for a cyber attack.

AD is used to manage a network and is the most significant part of securing the network. A good way for CPAs to get acquainted with AD is to think about when a user signs into a computer. AD checks the username and password against the database. If the credentials match what is in the database, AD allows the user login to the computer. A cyber attack on AD can reveal confidential client data, personal records of employees, bank information and every­thing else on the network.

Information in AD is organized in groups called objects. Objects in AD make it easy for administrators and users to find out information about the network. Records in objects can be usernames, passwords, computers, printers, shared resources and anything else that needs to be validated.

Methods of Attack

In an attack using AD, the intruder finds an entry point into a network in several ways, such as an illegitimate email, a security vulnerability, or hardware or software that is not configured correctly.

The most common way an attacker gets an entry point into a network has been by phishing. A phishing attack involves an email that appears to be from an associate, client or friend. The email contains a link to an invoice, document, software update or something that seems important to the recipient. When the recipient clicks on the link, the attacker obtains an entry point and can install malicious software that gives them access to that computer.

Recently, ransomware attackers have been using weaknesses in applications, insufficient security procedures, internal control deficiencies or other vulnerabilities to access AD. Vulnerabilities in a network can be caused by a programming mistake, web exploit or another weakness. Because there will always be vulnerabilities, it important to download Microsoft updates (patches) when prompted to do so. Patches always seem to come at the wrong time and take so long to complete, but they are vital to helping avoid attacks caused by vulnerabilities.

Attackers also exploit misconfigurations. Misconfigurations lead to vulnerabilities and occur in different ways. A misconfig­uration can happen when hardware and software are not set up correctly or default passwords in software are not changed.

Potential Damage

Once the attacker gains an entry point to the network, they have established local privileges. Local privileges give the attacker access to all the information on that computer and a path to AD. Individual users with local privileges have read-only access to AD, so the attack does not end yet. After local privileges are captured, the attacker can install malicious software, disable security applications, move across the network (lateral movement) and take other actions to access AD. 

Lateral movement is a technique used by cyber criminals to move through a network. Most of these moves are executed by taking advantage of misconfigured devices and vulnerabilities. As the attacker makes lateral moves across the system, they can attack passwords and get more privileges in a process called mining credentials. Ultimately, the attacker is mining for domain administrator rights. When domain administrator rights are compro­mised, the attacker is able to take over the network. Since most networks contain highly confidential information about clients, employees and the firm, an attack of this nature can cause significant damage.

Next Steps

While a network can never be completely protected, CPAs can reduce the risk of attacks on their networks by talking to their IT administrators about securing AD. Recommended actions include the following:

  • Review password policies
  • Disable idle computers
  • Ensure restricted access
  • Delete old credentials
  • Remove past versions of Windows
  • Check default configurations
  • Educate users
  • Ensure patches are up to date
  • Change default passwords
  • Evaluate privileged access
  • Backup the AD configuration regularly

Susan  Firriolo

Susan Firriolo

Susan Firriolo, CPA, CISA, is the director and founder of Pet Rescue 990 Project, which provides online tax and advisory services for pet rescue 501(c)(3) organizations. She is a member of several NJCPA interest groups and can be reached at sac2364@gmail.com.

More content by Susan Firriolo:

This article appeared in the Summer 2022 issue of New Jersey CPA magazine. Read the full issue.

 

 

Related events

June 11 - 14, 2024Atlantic City
Featured
May 20, 2024Live Webcast
May 22, 2024New Brunswick
May 22, 2024Red Bank & Live Webcast
May 28, 2024Live Webcast
May 30, 2024Webcast Replay
May 31, 2024Roseland & Live Webcast
June 13, 2024Live Webcast
June 25, 2024Live Webcast
June 26, 2024Live Webcast
June 26, 2024Live Webcast
June 28, 2024Live Webcast
July 15 - 18, 2024Live Webcast
July 31, 2024Live Webcast
August 12 - 14, 2024Atlantic City
August 13, 2024Live Webcast
August 14, 2024Live Webcast
August 21, 2024Live Webcast
September 3 - 6, 2024Live Webcast
September 16 - 19, 2024Live Webcast
September 19 - 20, 2024Live Webcast
September 23, 2024Live Webcast
September 24, 2024Live Webcast
September 24, 2024Live Webcast
September 25, 2024Live Webcast
September 26, 2024Live Webcast
October 15, 2024Live Webcast
October 17 - 18, 2024Live Webcast
October 21 - 24, 2024Live Webcast
October 23, 2024Live Webcast
October 23, 2024Live Webcast
October 24, 2024Webcast Replay
October 25, 2024Live Webcast
October 25, 2024Live Webcast
October 28 - 31, 2024Live Webcast
October 30, 2024Live Webcast
October 30, 2024Live Webcast
October 30, 2024Live Webcast
October 31, 2024Roseland & Live Webcast
November 1, 2024Live Webcast
November 1, 2024Live Webcast
November 5, 2024Live Webcast
November 6, 2024Live Webcast
November 14, 2024Live Webcast
November 20, 2024Live Webcast
November 20, 2024Live Webcast
November 21 - 22, 2024Live Webcast
November 21, 2024Live Webcast
November 25, 2024Live Webcast
November 25, 2024Live Webcast
December 3, 2024Live Webcast
December 4, 2024Live Webcast
December 4, 2024Live Webcast
December 5, 2024Live Webcast
December 5, 2024Live Webcast
December 6, 2024Live Webcast
December 9, 2024Live Webcast
December 10, 2024Live Webcast
December 12 - 13, 2024Live Webcast
December 13, 2024Live Webcast
December 13, 2024Live Webcast
December 16 - 17, 2024Live Webcast
December 17, 2024Webcast Replay
December 18, 2024Live Webcast
December 19, 2024Live Webcast
December 20, 2024Live Webcast
December 20, 2024Live Webcast
December 23, 2024Live Webcast