[APAC] Dissecting Golden SAML attack attackers used to exploit SUNBURST backdoor

Logo
Presented by

Randy Franklin Smith, Sally Vincent, and Dan Kaiser

About this talk

In this on-demand webinar, Randy Franklin Smith briefly introduces you to federation and SAML and how it works in Office 365. Then he will discuss how attackers exploited selected installations of the SUNBURST backdoor to laterally move to the victim organization’s ADFS server and stole its private key. Then, joined by the very knowledgeable security researchers Sally Vincent and Dan Kaiser from LogRhythm Labs, we will show you •How a Golden SAML attack works •Possible ways to mitigate via preventive controls •Methods for detection via SIEM rules and threat hunting •What Office 365 logs do and don’t tell us about federated logins You will see an actual demonstration of an attack by Sally, and we’ll cover the actual event IDs you need to monitor and attempt to correlate from: •Domain controllers •ADFS servers •Office 365 audit log This is a highly technical session we think you will really enjoy and benefit from. Especially because we expect to see a lot more Golden SAML attacks this year. Watch on-demand now!
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (270)
Subscribers (77711)
Exabeam is a global cybersecurity leader that delivers AI-driven security operations. High-integrity data ingestion, powerful analytics, and workflow automation power the industry’s most advanced self-managed and cloud-native security operations platform for threat detection, investigation, and response (TDIR). With a history of leadership in SIEM and UEBA, and a legacy rooted in AI, Exabeam empowers global security teams to combat cyberthreats, mitigate risk, and streamline security operations. Learn more at www.exabeam.com.